Summary: A new variant of the Mirai botnet, named Aquabotv3, is exploiting a vulnerability in Mitel SIP phones to offer DDoS attacks as a service. This variant introduces unique features for communication with attackers and has been actively promoted through various channels as a DDoS service. Researchers have identified significant vulnerabilities that, if exploited, could provide root access to affected devices and facilitate DDoS attacks targeting both Layer 4 and Layer 7 protocols.
Affected: Mitel SIP phone models and organizations using these devices
Keypoints :
- New variant Aquabotv3 exploits CVE-2024-41710, a command-injection vulnerability in various Mitel models.
- Aquabotv3 is marketed as DDoS as-a-service on platforms like Telegram, disguising actual attacks as tests.
- Threat actors are leveraging common vulnerabilities in IoT devices, highlighting the need for better security practices.
Source: https://www.darkreading.com/endpoint-security/mirai-variant-aquabot-exploits-mitel-phone-flaws
Views: 0