Tuesday, February 27, 2024

Hackers Attack Over 200,000 MikroTik Routers & Infected with Mass Coinhive Cryptojacking Malware

Cybercriminals infecting over 1,50,000 MikroTik Routers using Coinhive Cryptojacking Campaign using site key to ultimately mining the cryptocurrency.

Based on the Shodan query returns and the site key that used by an attacker for those devices indicates that it mainly focused on Brazil.

In this case, one of the users from Brazil complains that CoinHive code injects that every page that he visits but he can’t solve it even though changing the DNS and removing the router.

Also, a Tweet finds in Twitter say that the exploit used against the MikroTik routers that are not a zero day but for a vulnerability patched by MikroTik on April.


After the patch released by MikroTik, still there are hundreds of thousands of unpatched devices are out there and many of them found in Brazil.

A Researcher from trustwave found that the attacker used the device’s functionality in order to inject the CoinHive script into every web page that a user visited.

How does MikroTik Routers Infected

Intially stage of the attack starts with a custom error page that created by attackers and injects the embedded CoinHive script within it.

Criminals utilized the device functionality to injecting the CoinHive content into each page that a visit by users.

When user receiving the error page while web browsing, they will get this custom error page which will mine CoinHive for the attacker.

According to the researcher, The backend Apache server is connected to the router as well, and somewhere along the way there was an error and it was displayed to me, miner included. What this means is that this also impacts users who are not directly connected to the infected router’s network, but also users who visit websites behind these infected routers. In other words, the attack works in both directions.

So whenever user connecting the router using Wireless connection the CoinHive miners starts its execution and mine the cryptocurrency.

Here  mikrotik.php file is unknown and it doesn’t exist in the attacker server, also since the attackers having an extraordinary understanding of the Mikrotik router, It could be the script that injects CoinHive into every HTML page.

Also, it has an ability to change the current site key once the user will replace with another, here attackers perform the scheduled task that downloads and executes a script written for MikroTik routers.

Researchers find the script that attackers used to attack the vulnerable routers and “the script modifies some system settings, enables the proxy, fetches the custom error pages and creates the scheduled tasks for updating if needed. A backdoor account named “ftu” is created as well.”

This coinhive site key finds in over 170,000 MikroTik devices and some time server connected with infected servers also return an error page, another Tweet mention that another 25,000 servers are infected.


This attack warning that the reminder to everyone who has a MikroTik device to patch as soon as possible.

Also Read:

HNS IoT Botnet Scanning & Exploits the Routers to Compromise the Victims Networks

Russia, Routers, and Why Virtually Everyone is part of the DDoS Problem

Cisco Auditing Tool & Cisco Global Exploiter to Exploit 14 Vulnerabilities in Cisco Switches and Routers


Latest articles

14-Year-Old CMS Editor Flaw Exploited to Hack Govt & Edu Sites

Hackers have exploited a vulnerability in a 14-year-old Content Management System (CMS) editor, FCKeditor,...

Zyxel Firewall Flaw Let Attackers Execute Remote Code

Four new vulnerabilities have been discovered in some of the Zyxel Firewall and access...

Hackers Abuse Telegram API To Exfiltrate User Information

Attackers have been using keywords like "remittance" and "receipts" to spread phishing scripts using...

ThreatHunter.ai Stops Hundreds of Attacks in 48 Hours: Fighting Ransomware and Nation-State Cyber Threats

The current large surge in cyber threats has left many organizations grappling for security...

WordPress Plugin Flaw Exposes 200,000+ Websites for Hacking

A critical security flaw has been identified in the Ultimate Member plugin for WordPress,...

Hackers Actively Hijacking ConnectWise ScreenConnect server

ConnectWise, a prominent software company, issued an urgent security bulletin on February 19, 2024,...

Heavily Obfuscated PIKABOT Evades EDR Protection

PIKABOT is a polymorphic malware that constantly modifies its code, making it hard to...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles