My CCR was hacked again. This time they managed to change the username and password. The identity is now “test”
Is there a username and password this exploit uses?
I remember with the ubnt exploit last year they changed some radios to a different username and password, but they were all the same username and password.
Did you change your username and password after the previous hack?
If you suspect a vulnerability, the only way to get it confirmed and fixed is to contact support with given supout (which can be generated on router if you still have enough credentials: https://wiki.mikrotik.com/wiki/Manual:Support_Output_File).
The best you can get on the forum is affirmation that your device being hacked is to be expected if you open services to the public, run an older version of ROS or upgraded but you didn’t change password / secure services afterwards. There are no default credentials (besides admin / no password) but the credential database could be retrieved in older releases.
Yea, i changed the username and password last time we got hacked (on father’s day). Maybe I didn’t clear everything.
Unfortunately, this time we’ll need to reset the MT to default and rebuild since I can’t get into the device. So I won’t be able to send the supout file.
I had just upgraded the device last night to 6.42.4.
The last time it was hacked it also changed the identity to “test” but did not change the password. Are there any forum posts about this particular exploit? I am just curious.