• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new aquabot botnet exploits cve 2024 41710 in mitel phones for ddos

New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks

You are here: Home / General Cyber Security News / New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks
January 30, 2025

A Mirai botnet variant dubbed Aquabot has been observed actively attempting to exploit a medium-severity security flaw impacting Mitel phones in order to ensnare them into a network capable of mounting distributed denial-of-service (DDoS) attacks.

The vulnerability in question is CVE-2024-41710 (CVSS score: 6.8), a case of command injection in the boot process that could allow a malicious actor to execute arbitrary commands within the context of the phone.

It affects Mitel 6800 Series, 6900 Series, 6900w Series SIP Phones, and Mitel 6970 Conference Unit. It was addressed by Mitel in mid-July 2024. A proof-of-concept (PoC) exploit for the flaw became publicly available in August.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

Outside of CVE-2024-41710, some of the other vulnerabilities targeted by the botnet include CVE-2018-10561, CVE-2018-10562, CVE-2018-17532, CVE-2022-31137, CVE-2023-26801, and a remote code execution flaw targeting Linksys E-series devices.

“Aquabot is a botnet that was built off the Mirai framework with the ultimate goal of distributed denial-of-service (DDoS),” Akamai researchers Kyle Lefton and Larry Cashdollar said. “It has been known since November 2023.”

The web infrastructure company said it detected active exploitation attempts against CVE-2024-41710 since early January 2025, with the attacks mirroring a “payload almost identical to the PoC” to deploy the botnet malware.

The attack involves executing a shell script that, in turn, uses the “wget” command to retrieve Aquabot for different CPU architectures.

The Aquabot Mirai variant spotted in the attack has been assessed to be a third iteration of the malware, sporting a novel “report_kill” function that reports back to the command-and-control (C2) server when a kill signal is caught on the infected device. However, sending this information hasn’t been found to elicit any response from the server to date.

This new version, besides triggering C2 communication upon detecting certain signals, renames itself to “httpd.x86” to avoid attracting attention and is programmed to terminate processes that match certain requirements, such as local shells. It’s suspected that the signal handling features are likely incorporated to craft more stealthy variants or detect malicious activity from competing botnets.

There is some evidence suggesting that the threat actors behind Aquabot are offering the network of compromised hosts as a DDoS service on Telegram under the monikers Cursinq Firewall, The Eye Services, and The Eye Botnet.

Cybersecurity

The development is a sign that Mirai continues to plague a wide range of internet-connected devices that often lack proper security features, or have either reached end-of-life or left accessible with default configuration and passwords, making them low-hanging fruits ripe for exploitation and a key conduit for DDoS attacks.

“Threat actors commonly claim that the botnet is used only for DDoS mitigation testing purposes to try to mislead researchers or law enforcement,” the researchers said.

“Threat actors will claim it’s just a PoC or something educational, but a deeper analysis shows that they are in fact advertising DDoS as a service, or the owners are boasting about running their own botnet on Telegram.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «lazarus group uses react based admin panel to control global cyber Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks
Next Post: Unpatched PHP Voyager Flaws Leave Servers Open to One-Click RCE Exploits unpatched php voyager flaws leave servers open to one click rce»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.