IoT in the Crosshairs: RouterOS Attacks in the Wild

The number of IoT devices is growing across organizations, and with them the number of threat actors interested in utilizing internet and network connected devices as vectors, expanding the potential attack surface of organizations. In this session, Section52, Microsoft Defender for IoT's Security Research group will share Mikrotik exposure risks as well as our recent discoveries on vulnerabilities exploited by different malware families, their persistency mechanisms, and the protocols abused to communicate with command-and-control centers. With our newly released open-source tool, we will demonstrate how to investigate devices for vulnerabilities.