Mirai Variant ‘Aquabot’ Exploits Mitel Device Flaws

Mirai Variant ‘Aquabot’ Exploits Mitel Device Flaws
Summary: A new variant of the Mirai botnet, named Aquabotv3, is exploiting a vulnerability in Mitel SIP phones to offer DDoS attacks as a service. This variant introduces unique features for communication with attackers and has been actively promoted through various channels as a DDoS service. Researchers have identified significant vulnerabilities that, if exploited, could provide root access to affected devices and facilitate DDoS attacks targeting both Layer 4 and Layer 7 protocols.

Affected: Mitel SIP phone models and organizations using these devices

Keypoints :

  • New variant Aquabotv3 exploits CVE-2024-41710, a command-injection vulnerability in various Mitel models.
  • Aquabotv3 is marketed as DDoS as-a-service on platforms like Telegram, disguising actual attacks as tests.
  • Threat actors are leveraging common vulnerabilities in IoT devices, highlighting the need for better security practices.

Source: https://www.darkreading.com/endpoint-security/mirai-variant-aquabot-exploits-mitel-phone-flaws

Views: 0