Saturday, May 24, 2025
HomeCyber Security NewsNew Aquabot Malware Actively Exploiting Mitel SIP phones injection vulnerability

New Aquabot Malware Actively Exploiting Mitel SIP phones injection vulnerability

Published on

SIEM as a Service

Follow Us on Google News

Akamai’s Security Intelligence and Response Team (SIRT) has uncovered a novel variant of the Mirai-based botnet malware, dubbed Aquabotv3, actively targeting Mitel SIP phones via a critical vulnerability.

This marks the third observed iteration of Aquabot, which now showcases unique capabilities not previously seen in Mirai derivatives.

The malware exploits CVE-2024-41710, a command injection vulnerability disclosed in mid-2024, to gain unauthorized root access on affected devices.

- Advertisement - Google News

Aquabotv3 introduces an unorthodox feature: a “report_kill” mechanism that notifies its command-and-control (C2) servers upon receiving termination signals, such as SIGTERM or SIGKILL, on infected devices.

Mitel SIP phones injection vulnerability
Reporting to the C2 that it caught a kill signal

While this addition could enhance botnet monitoring or resilience, its true purpose remains speculative.

Aquabotv3’s activity underscores an evolving strategy by threat actors to refine malware for improved operational effectiveness.

Malware Propagation

The exploited vulnerability, CVE-2024-41710, affects Mitel’s 6800, 6900, and 6900w series SIP phones, including the 6970 Conference Unit, with firmware versions up to R6.4.0.HF1.

The flaw arises from improper input sanitization, allowing attackers to inject malicious payloads via crafted HTTP POST requests.

A publicly available proof-of-concept (PoC) by researcher Kyle Burns in mid-2024 demonstrated how an attacker could manipulate device configurations during the boot process to execute arbitrary code.

In early January 2025, Akamai’s global honeypot network detected active exploitation attempts closely resembling the PoC payload.

The malware leverages these vulnerabilities to download and execute “bin.sh,” a script that retrieves Aquabot binaries compatible with multiple architectures, including x86, ARM, and MIPS.

Advanced Features and Target Expansion

Aquabotv3 retains its foundational DDoS attack capabilities while introducing sophisticated detection-avoidance techniques.

For instance, it employs process renaming and signal handling to thwart termination attempts.

It also establishes communication with multiple C2 infrastructure endpoints, ensuring robust connectivity.

Additionally, the malware exploits other vulnerabilities, including Hadoop YARN flaws (CVE-2018-17532) and other IoT device weaknesses, to broaden its footprint.

Observed payloads indicate a focus on distributing Mirai variants across various vulnerable systems.

Unusual for Mirai derivatives, Aquabotv3’s unique signal-handling and C2 reporting functions may enable attackers to monitor control disruptions or enhance malware stealth in future iterations.

However, its continuous communication with C2 servers may also expose its presence, potentially aiding defenders in mitigation efforts.

Mitel SIP phones injection vulnerability
Advertisement on one of the botnet’s domains

Aquabotv3 reaffirms the persistent threat posed by Mirai-based malware to IoT ecosystems, particularly devices with weak security configurations.

Its emergence highlights the pressing need for organizations to prioritize firmware updates, strengthen input sanitization, and replace legacy systems.

Simple measures, such as changing default credentials on IoT devices, can significantly reduce exposure to such attacks.

As DDoS attacks remain a lucrative cybercriminal strategy, Akamai warns that botnets like Aquabot are increasingly marketed as “DDoS-as-a-Service” on underground platforms, including Telegram.

Security teams are encouraged to monitor indicators of compromise (IOCs) and deploy proactive defenses, such as anomaly detection systems and firewall rule updates.

Akamai assures continued surveillance of this threat and regularly updates its research to inform the cybersecurity community.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...