![]() One of the main reasons for Trickbot’s persistence is that it has continued to change and evolve over the years. Trickbot was first discovered in 2016 and, despite efforts by Microsoft to stamp it out, has continued to remain a threat online. This article will introduce some background on the MikroTik vulnerability, the Trickbot malware, and some ways you can protect yourself. It is designed to analyze routers for Indicators of Compromise (IoCs) associated with Trickbot. The tool, RouterOS Scanner, has its source code available on GitHub. ![]() ![]() In mid-March, Microsoft released a free, open-source tool that can be used to secure MikroTik routers. This blog was written by an independent guest blogger.
0 Comments
Leave a Reply. |