MikroTik Official Response: Cisco informed us on May 22nd of 2018, that a malicious tool was found on several manufacturer devices, including three devices made by MikroTik. We are highly certain that this malware was installed on these devices through a vulnerability in MikroTik RouterOS software, which was already patched by MikroTik in March 2017. Simply upgrading RouterOS software deletes the malware, any other 3rd party files and closes the vulnerability. Let us know if you need more details. Upgrading RouterOS is done by a few clicks and takes only a minute. https://forum.mikrotik.com/viewtopic.php?f=21&t=134776&p=663825#p663825 Dennis Burgess, MikroTik Certified Trainer -----Original Message----- From: NANOG <nanog-bounces@nanog.org> On Behalf Of Mark Tinka Sent: Thursday, May 24, 2018 3:44 AM To: surfer@mauigateway.com; nanog@nanog.org Subject: Re: BGP Battleships So the moral of the story is... "former Level(3)" must step into the bar and have a beer with the rest of us :-)? Mark. On 23/May/18 22:53, Scott Weeks wrote:
I saw the below on SWINOG and thought it might add some fun in the middle of all this General Data Protection Regulation conversation. :)
scott
--- Begin forwarded message:
From: Gregor Riepl <onitake@gmail.com> To: swinog@lists.swinog.ch Subject: [swinog] BGP Battleships Date: Tue, 22 May 2018 23:18:51 +0200
Some good ol' fun with BGP:
https://imsva91-ctp.trendmicro.com:443/wis/clicktime/v1/query?url=http s%3a%2f%2fblog.benjojo.co.uk%2fpost%2fbgp%2dbattleships&umid=11F39436- 6CEF-A905-AF98-203A0AD563EA&auth=079c058f437b7c6303d36c6513e5e8848d0c5 ac4-9d1558ea3856dddcaa08f2ee54a6060b4ee27e65
Please (don't?) try this at home!
.