Aquabotv3: The Next Evolution of Mirai in DDoS Attacks

Red | Attack Report
Download PDF

A new Mirai botnet variant, Aquabotv3, is spreading this time offering DDoS-as-a-service by exploiting vulnerabilities in Mitel SIP phones. What sets this strain apart is its ability to establish direct communication with attacker-controlled command-and-control (C2) servers. Researchers have identified it as an evolution of Aquabot, that actively exploits CVE-2024-41710, a command injection flaw in Mitel SIP devices. This development highlights the growing sophistication of botnet operations and the increasing risks to unpatched enterprise communication systems.

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox

Cyber Horizons 2025

What Last Year’s Attacks Reveal About Today’s Risks

Watch the Webinar on-demand and get a FREE copy of our Cyber Horizons 2025 report.

Our Speakers
Speaker 1

Prateek Bhajanka Global Field CISO & Former Gartner Analyst Hive Pro Inc.

Speaker 2

Ankit Mani Manager Threat Intel HiveForce Labs

Speaker 3

Sreevani Tonipe Senior Threat Researcher HiveForce Labs