Cyber Security News

New Aquabot Malware Actively Exploiting Mitel SIP phones injection vulnerability

Akamai’s Security Intelligence and Response Team (SIRT) has uncovered a novel variant of the Mirai-based botnet malware, dubbed Aquabotv3, actively targeting Mitel SIP phones via a critical vulnerability.

This marks the third observed iteration of Aquabot, which now showcases unique capabilities not previously seen in Mirai derivatives.

The malware exploits CVE-2024-41710, a command injection vulnerability disclosed in mid-2024, to gain unauthorized root access on affected devices.

Aquabotv3 introduces an unorthodox feature: a “report_kill” mechanism that notifies its command-and-control (C2) servers upon receiving termination signals, such as SIGTERM or SIGKILL, on infected devices.

Reporting to the C2 that it caught a kill signal

While this addition could enhance botnet monitoring or resilience, its true purpose remains speculative.

Aquabotv3’s activity underscores an evolving strategy by threat actors to refine malware for improved operational effectiveness.

Malware Propagation

The exploited vulnerability, CVE-2024-41710, affects Mitel’s 6800, 6900, and 6900w series SIP phones, including the 6970 Conference Unit, with firmware versions up to R6.4.0.HF1.

The flaw arises from improper input sanitization, allowing attackers to inject malicious payloads via crafted HTTP POST requests.

A publicly available proof-of-concept (PoC) by researcher Kyle Burns in mid-2024 demonstrated how an attacker could manipulate device configurations during the boot process to execute arbitrary code.

In early January 2025, Akamai’s global honeypot network detected active exploitation attempts closely resembling the PoC payload.

The malware leverages these vulnerabilities to download and execute “bin.sh,” a script that retrieves Aquabot binaries compatible with multiple architectures, including x86, ARM, and MIPS.

Advanced Features and Target Expansion

Aquabotv3 retains its foundational DDoS attack capabilities while introducing sophisticated detection-avoidance techniques.

For instance, it employs process renaming and signal handling to thwart termination attempts.

It also establishes communication with multiple C2 infrastructure endpoints, ensuring robust connectivity.

Additionally, the malware exploits other vulnerabilities, including Hadoop YARN flaws (CVE-2018-17532) and other IoT device weaknesses, to broaden its footprint.

Observed payloads indicate a focus on distributing Mirai variants across various vulnerable systems.

Unusual for Mirai derivatives, Aquabotv3’s unique signal-handling and C2 reporting functions may enable attackers to monitor control disruptions or enhance malware stealth in future iterations.

However, its continuous communication with C2 servers may also expose its presence, potentially aiding defenders in mitigation efforts.

Advertisement on one of the botnet’s domains

Aquabotv3 reaffirms the persistent threat posed by Mirai-based malware to IoT ecosystems, particularly devices with weak security configurations.

Its emergence highlights the pressing need for organizations to prioritize firmware updates, strengthen input sanitization, and replace legacy systems.

Simple measures, such as changing default credentials on IoT devices, can significantly reduce exposure to such attacks.

As DDoS attacks remain a lucrative cybercriminal strategy, Akamai warns that botnets like Aquabot are increasingly marketed as “DDoS-as-a-Service” on underground platforms, including Telegram.

Security teams are encouraged to monitor indicators of compromise (IOCs) and deploy proactive defenses, such as anomaly detection systems and firewall rule updates.

Akamai assures continued surveillance of this threat and regularly updates its research to inform the cybersecurity community.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely

In a recent discovery by Socket researchers, a malicious npm package named postcss-optimizer has been…

40 minutes ago

Lazarus Hackers Tamper with Software Packages to Gain Backdoor Access to the Victims Device

A recent investigation conducted by STRIKE, a division of SecurityScorecard, has unveiled the intricate and…

45 minutes ago

TeamViewer Clients Vulnerability Leads to Privilege Escalation

TeamViewer, a widely used remote access software, has announced a critical vulnerability in its Windows…

56 minutes ago

Tria Stealer Malware Exploits Android Devices to Harvest SMS Data

Cybersecurity researchers have uncovered a sophisticated Android malware campaign known as "Tria Stealer," which is…

2 hours ago

Hackers Sell Compromised Emails and Google Ads Accounts on Dark Web

A new wave of cybercrime is surfacing as hackers exploit compromised emails and digital advertising…

3 hours ago

Cybercriminals Hijack Government Sites to Lauch Phishing Attacks

Cybersecurity researchers have identified a persistent trend in which threat actors exploit vulnerabilities in government…

4 hours ago