Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks

The Hacker News by The Hacker News
January 30, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Jan 30, 2025Ravie LakshmananVulnerability / IoT Security

A Mirai botnet variant dubbed Aquabot has been observed actively attempting to exploit a medium-severity security flaw impacting Mitel phones in order to ensnare them into a network capable of mounting distributed denial-of-service (DDoS) attacks.

The vulnerability in question is CVE-2024-41710 (CVSS score: 6.8), a case of command injection in the boot process that could allow a malicious actor to execute arbitrary commands within the context of the phone.

It affects Mitel 6800 Series, 6900 Series, 6900w Series SIP Phones, and Mitel 6970 Conference Unit. It was addressed by Mitel in mid-July 2024. A proof-of-concept (PoC) exploit for the flaw became publicly available in August.

Cybersecurity

Outside of CVE-2024-41710, some of the other vulnerabilities targeted by the botnet include CVE-2018-10561, CVE-2018-10562, CVE-2018-17532, CVE-2022-31137, CVE-2023-26801, and a remote code execution flaw targeting Linksys E-series devices.

“Aquabot is a botnet that was built off the Mirai framework with the ultimate goal of distributed denial-of-service (DDoS),” Akamai researchers Kyle Lefton and Larry Cashdollar said. “It has been known since November 2023.”

The web infrastructure company said it detected active exploitation attempts against CVE-2024-41710 since early January 2025, with the attacks mirroring a “payload almost identical to the PoC” to deploy the botnet malware.

The attack involves executing a shell script that, in turn, uses the “wget” command to retrieve Aquabot for different CPU architectures.

The Aquabot Mirai variant spotted in the attack has been assessed to be a third iteration of the malware, sporting a novel “report_kill” function that reports back to the command-and-control (C2) server when a kill signal is caught on the infected device. However, sending this information hasn’t been found to elicit any response from the server to date.

This new version, besides triggering C2 communication upon detecting certain signals, renames itself to “httpd.x86” to avoid attracting attention and is programmed to terminate processes that match certain requirements, such as local shells. It’s suspected that the signal handling features are likely incorporated to craft more stealthy variants or detect malicious activity from competing botnets.

There is some evidence suggesting that the threat actors behind Aquabot are offering the network of compromised hosts as a DDoS service on Telegram under the monikers Cursinq Firewall, The Eye Services, and The Eye Botnet.

Cybersecurity

The development is a sign that Mirai continues to plague a wide range of internet-connected devices that often lack proper security features, or have either reached end-of-life or left accessible with default configuration and passwords, making them low-hanging fruits ripe for exploitation and a key conduit for DDoS attacks.

“Threat actors commonly claim that the botnet is used only for DDoS mitigation testing purposes to try to mislead researchers or law enforcement,” the researchers said.

“Threat actors will claim it’s just a PoC or something educational, but a deeper analysis shows that they are in fact advertising DDoS as a service, or the owners are boasting about running their own botnet on Telegram.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
Unpatched PHP Voyager Flaws Leave Servers Open to One-Click RCE Exploits

Unpatched PHP Voyager Flaws Leave Servers Open to One-Click RCE Exploits

Recommended.

Mark Wiedman, a top BlackRock exec thought to be Fink’s successor, is leaving the company

Mark Wiedman, a top BlackRock exec thought to be Fink’s successor, is leaving the company

January 16, 2025
⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025

Trending.

Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025
Společnost Huawei spolu s průkopníky v oboru představila více než 30 referenčních příkladů digitální a inteligentní transformace v oblasti datové komunikace

Společnost Huawei spolu s průkopníky v oboru představila více než 30 referenčních příkladů digitální a inteligentní transformace v oblasti datové komunikace

September 23, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio