Akamai's Security Intelligence and Response Team has identified a new variant of the Mirai-based malware known as Aquabotv3. This malware exploits vulnerabilities in Mitel phones and possesses a unique capability that allows it to report kill signals back to its command-and-control server. This behavior has not been observed in previous variants and could signify a new approach by botnet authors to monitor and control their networks. Aquabotv3 not only retains classic DDoS attack functions but also integrates new features that enhance its resilience to termination attempts.
A new variant of the Mirai-based malware Aquabot, known as Aquabotv3, shows unprecedented behavior by reporting kill signals back to its command server.
The new Aquabotv3 variant exploits a command injection vulnerability in Mitel phones, highlighting its ability to potentially expand its botnet reach.
This sophisticated malware variant has functions to manage kill signals, indicating a possible evolution in the strategy employed by botnet authors.
Akamai's findings suggest the existence of multiple versions of Aquabot, with Aquabotv3 demonstrating enhanced capabilities and potentially alarming characteristics.
Collection
[
|
...
]