Greetings everyone, I am using an RB450G and am having some troubles with what I think to be this recent infection.
Yesterday I noticed my global IP had changed for the machines on my network, today I noticed the information about the VPNFilter hack of routers. I’ve confirmed my modem is giving out the expected IP, however the IP displayed in Winbox is different. The wide area IP displayed under addresses in winbox is not the one being assigned by my modem. I had been running 6.34.4 since March of '17. So yeah, I likely had it in an unprotected state.
What I’ve tried:
First I upgraded the RouterOS to 6.42.3 via Winbox. After rebooting it is still infected.
The I tried upgrading via Netinstall. I was able to complete the Netinstall process, however it is still infected.
I used hyperterminal to serial in to the modem to upgrade the boot firmware to ar7100_3.41.fwf, still infected.
I’ve tried different combinations of Netinstalling the OS and serial installing the boot firmware, and the router continues to give me an IP that is not mine.
I’m not sure where to go from here, the only thing I could think from here would be to wipe the NAND, but I’d lose my license, so thought I ought to post here first and see if there were any suggestions.
Thank you for your reply.
I am currently simply using the default configuration that is restored after resetting / reloading the router.
Here’s is a copy of /export, I believe this is what you were asking for.
[admin@MikroTik] > /export
# jan/02/1970 00:02:49 by RouterOS 6.42.3
# software id = ####-####
#
# model = 450G
# serial number = ############
/interface bridge
add admin-mac=D4:CA:6D:78:5F:91 auto-mac=no comment=defconf name=bridge
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=default-dhcp ranges=192.168.88.10-192.168.88.254
/ip dhcp-server
add address-pool=default-dhcp disabled=no interface=bridge name=defconf
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/ip address
add address=192.168.88.1/24 comment=defconf interface=bridge network=\
192.168.88.0
/ip dhcp-client
add comment=defconf dhcp-options=hostname,clientid disabled=no interface=ether1
/ip dhcp-server network
add address=192.168.88.0/24 comment=defconf gateway=192.168.88.1
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=192.168.88.1 name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=\
invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=\
out,none out-interface-list=WAN
/system routerboard settings
set silent-boot=no
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN
[admin@MikroTik] >
This is again the fresh config offered up by the router after a netinstall.
Also, I’m sorry if I’m missing something obvious. I started using this router several years ago while working at and ISP, but fell ill, and many things took a back seat for a long time, including router security. Thank you for the help.
edit
I’m fairly sure I rectified the problem, appears to have been upstream at the dhcp server.
Sorry for the troubles, thank you for the assistance.