Aquabot Attack: Mitel Phones in the Crosshairs of DDoS Chaos!
Aquabot, the Mirai botnet variant, has been busy exploiting a security flaw in Mitel phones (CVE-2024-41710) to recruit them for DDoS attacks. This botnet is so stealthy it even renames itself to “httpd.x86” and boasts a cunning “report_kill” function. It’s like a secret agent, but for chaos!

Hot Take:
Ah, Mitel phones, the latest victim in the never-ending cybersecurity soap opera. It seems like hackers just can’t resist the allure of turning phones into unwilling participants in the DDoS Olympics. Maybe it’s time for Mitel to start a support group for exploited devices? “Hi, I’m a phone, and I’ve been botnetted…”
Key Points:
- Aquabot, a Mirai botnet variant, targets a medium-severity security flaw in Mitel phones.
- The vulnerability, CVE-2024-41710, allows attackers to execute arbitrary commands during the boot process.
- Aquabot has a new “report_kill” function to communicate with its command-and-control server.
- Evidence suggests Aquabot is offered as a DDoS service on Telegram.
- This highlights ongoing security issues with outdated or improperly configured devices.
Already a member? Log in here