Aquabot Attack: Mitel SIP Phones Face New Mirai Malware Threat!
Akamai reports that Aquabot, a Mirai-based malware, is targeting Mitel SIP phones via a command injection vulnerability, CVE-2024-41710. Despite firmware updates, Aquabot’s antics continue, using HTTP POST requests to bypass sanitization checks and launch DDoS attacks. It’s like the phones joined a botnet flash mob, and nobody sent the memo!

Hot Take:
It seems like Mitel SIP phones have become the latest hot commodity for cyber crooks aiming to build their own botnet empire. Who knew that your conference call device could be moonlighting as a DDoS attack agent? Just when you thought your office phone couldn’t be any more annoying, it starts helping hackers crash websites. Talk about a hostile takeover!
Key Points:
- Aquabot malware is targeting Mitel SIP phones using a Mirai-based approach.
- The exploit uses CVE-2024-41710, a vulnerability in Mitel SIP phones, to carry out DDoS attacks.
- Firmware updates to patch the vulnerability were released by Mitel in July 2024.
- Initial exploitation attempts were observed by Akamai in January 2025.
- Aquabot is also targeting other vulnerabilities in Hadoop YARN, Roxy-WI, and various routers.
Already a member? Log in here