![mikrotik routeros download mikrotik routeros download](https://wiki.mikrotik.com/images/3/3d/Up4.jpg)
Several serious vulnerabilities and exploits have been identified in MikroTik's RouterOS firmware over the past few years that allow devices to be compromised both from the internet or from inside local networks without authentication. Eclypsium had previously researched TrickBot, a Trojan known to serve as a malware delivery platform, including for the Ryuk ransomware, when its creators added a module capable of infecting the low-level firmware (UEFI) of victim computers. Researchers from firmware and hardware security firm Eclypsium became interested in studying the attack surface of internet exposed MikroTik devices after operators of the notorious TrickBot botnet used compromised MikroTik routers to regain control of the botnet after Microsoft managed to take over and shut down the botnet's traditional command-and-control servers last year. What makes MikroTik devices particularly popular is the computing power and features they offer at a very competitive price point compared to home office and enterprise-grade devices from other manufacturers. These include routers, switches and wireless access points.
![mikrotik routeros download mikrotik routeros download](https://1.bp.blogspot.com/-dKX6ex9rgTc/VwCyFQqJ_yI/AAAAAAAAAT0/_BSt2fWDifoXCV97XQEQi7IGI31o7kR5A/s640/0001.png)
MikroTik is a Latvian company that manufactures networking devices for the home, business and ISP markets around the world. Security researchers from Eclypsium have developed a tool that enterprise administrators can use to scan their corporate networks or their remote employees' home networks for unpatched MikroTik routers that have been continuously abused in recent years by different cybercriminal groups.