We monitor over 100 Mikrotik routers - all of which are independent to each other and have a fairly basic config.
We lock down all the management ports (WinBOX, SSH) with only IPs allowed from our network.
We then monitor all our estate with LibreNMS (SNMP Monitoring server)
What is strange is we have noticed about 50% of our Mikrotik estate all suddenly show the same high CPU behaviour at the same time.
example screenshots of independent Mikrotik routers
As you can see a high percentage of these routers all for some reason have jumped to 40% CPU all at the same time, even though these devices are not connected or aware of each other. They simply are acting as small business routers with a FTTC/Broadband Modem attached.
When i look at the /tool profile on the higher CPU devices the culprit appears to be ‘management’

I havea feeling this is some type of DDoS type attempt against Mikrotik devices as there is no explanation for this.
Please can others go and check their Mikrotiks and see if they see similar behaviour that happened around 1-2am UK time today.
Example of our config is here
/interface bridge
add name=bridge1
/interface ethernet
set [ find default-name=ether1 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
set [ find default-name=ether2 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
set [ find default-name=ether3 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
set [ find default-name=ether4 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
set [ find default-name=ether5 ] advertise=10M-half,10M-full,100M-half,100M-full,1000M-half,1000M-full
/interface pppoe-client
add add-default-route=yes disabled=no interface=ether1 name=pppoe-out1 password=Password use-peer-dns=yes user=c@xxx.co.uk
/interface wireless
set [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-Ce disabled=no frequency=2442 mode=ap-bridge ssid=“Bezza WiFi” wps-mode=disabled
/interface wireless security-profiles
set [ find default=yes ] authentication-types=wpa-psk,wpa2-psk eap-methods=“” group-ciphers=tkip,aes-ccm mode=dynamic-keys supplicant-identity=MikroTik unicast-ciphers=tkip,aes-ccm wpa-pre-shared-key=password! wpa2-pre-shared-key=password
/ip pool
add name=dhcp_pool0 ranges=192.168.77.10-192.168.77.254
/ip dhcp-server
add address-pool=dhcp_pool0 disabled=no interface=bridge1 lease-time=1d name=dhcp1
/system logging action
set 0 memory-lines=1
set 1 memory-lines=1 target=memory
set 2 memory-lines=1 target=memory
/interface bridge port
add bridge=bridge1 interface=ether2
add bridge=bridge1 interface=ether3
add bridge=bridge1 interface=ether4
add bridge=bridge1 interface=ether5
add bridge=bridge1 interface=wlan1
/ip address
add address=192.168.77.1/24 interface=bridge1 network=192.168.77.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-server config
set store-leases-disk=1d
/ip dhcp-server network
add address=192.168.77.0/24 dns-server=8.8.8.8,8.8.4.4 gateway=192.168.77.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 name=router.lan
/ip firewall filter
add action=fasttrack-connection chain=input
add action=drop chain=input dst-port=53 in-interface=pppoe-out1 protocol=udp
add action=drop chain=input dst-port=53 in-interface=pppoe-out1 protocol=tcp
/ip firewall nat
add action=masquerade chain=srcnat out-interface=pppoe-out1
/ip firewall service-port
set sip disabled=yes
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www address=192.168.77.0/24
set ssh address=192.168.77.0/24,185.109.104.0/22,77.76.73.254/32,192.168.77.0/24
set api disabled=yes
set winbox address=185.109.104.0/22,212.56.94.105/32,77.76.73.254/32,192.168.77.0/24
set api-ssl disabled=yes
/snmp
set enabled=yes location=“PR7 XXX” trap-target=185.109.106.4 trap-version=2
/system clock
set time-zone-name=Europe/London
/system identity
set name=“Customer : cpe”
/system routerboard settings
set silent-boot=no
Thanks


