{"vulnerability": "CVE-2024-41710", "sightings": [{"uuid": "b30625f0-090f-4038-8a3b-86f756510f50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgxsvhlas724", "content": "", "creation_timestamp": "2025-01-30T15:38:15.956036Z"}, {"uuid": "027e632a-9c38-4241-9a3b-783c7932da05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lgw63sql4e2l", "content": "", "creation_timestamp": "2025-01-29T23:53:20.608437Z"}, {"uuid": "91ee7d27-a758-4e49-8b78-41b47c879790", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/bleepingcomputer.com/post/3lgwbktrlkq2z", "content": "", "creation_timestamp": "2025-01-30T00:55:25.959569Z"}, {"uuid": "4a4b255d-6a58-4692-af95-5e720d353dab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lgwcbgokod2p", "content": "", "creation_timestamp": "2025-01-30T01:08:03.495489Z"}, {"uuid": "af1926c3-d6cc-42c1-bc4c-f350563063b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lhcdghfo7s2s", "content": "", "creation_timestamp": "2025-02-03T20:00:48.022798Z"}, {"uuid": "477d981b-8f9f-4aa5-9103-61eafaa70b14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/ninjaowl.ai/post/3lgxyswk6pp2w", "content": "", "creation_timestamp": "2025-01-30T17:24:12.856791Z"}, {"uuid": "d6acbd30-c432-4738-850e-638aabc37697", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://threatintel.cc/2025/01/29/aquabot-botnet-targeting-vulnerable-mitel.html", "content": "", "creation_timestamp": "2025-01-29T22:57:56.000000Z"}, {"uuid": "f5a7f5c9-a66d-4c40-8b75-9ba0119452d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/bluecyber.bsky.social/post/3lgvba3e4e222", "content": "", "creation_timestamp": "2025-01-29T15:16:45.273338Z"}, {"uuid": "fc08acd2-338d-4516-9508-79ee52c01b4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgwyo26r4n2q", "content": "", "creation_timestamp": "2025-01-30T07:48:49.477910Z"}, {"uuid": "4849d7ac-16f8-4787-b0d7-983a8bea1690", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lgwzf4kcbu27", "content": "", "creation_timestamp": "2025-01-30T08:01:44.486127Z"}, {"uuid": "483d1524-cf2d-4f62-8f4d-2d0fc1e8afc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://threatintel.cc/2025/01/31/new-aquabotv-botnet-malware-targets.html", "content": "", "creation_timestamp": "2025-01-31T11:36:19.000000Z"}, {"uuid": "2d3c71b1-6b24-4ca1-beae-3a2246c15fd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/rcinghio.bsky.social/post/3lgxhed6zas2r", "content": "", "creation_timestamp": "2025-01-30T12:11:41.055594Z"}, {"uuid": "05449fdf-15dd-4559-96b4-abc82b3fad31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-41710", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lgxajy4w36x2", "content": "", "creation_timestamp": "2025-01-30T10:10:14.074971Z"}, {"uuid": "b4b2a49d-ee87-4ab6-98da-6bb596130d6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://mastodon.social/users/cryptax/statuses/113916857482555178", "content": "", "creation_timestamp": "2025-01-30T10:34:59.662452Z"}, {"uuid": "c31a3933-6a1f-40d5-8b3c-d7255a252da7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/reconbee.bsky.social/post/3lh2phrxifk26", "content": "", "creation_timestamp": "2025-01-31T19:15:01.272784Z"}, {"uuid": "f9c9a814-3920-4008-904d-bd8a26f5d5d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/mbissey.bsky.social/post/3lgxdmw5uva2q", "content": "", "creation_timestamp": "2025-01-30T11:05:02.763800Z"}, {"uuid": "723f8858-2735-462a-84ad-d95ce4c4e143", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lgvujkapyf2c", "content": "", "creation_timestamp": "2025-01-29T21:02:07.321424Z"}, {"uuid": "4850978a-9e1f-4be6-a245-b10a4bba91ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lgxmq2h7tc2w", "content": "", "creation_timestamp": "2025-01-30T13:47:55.264183Z"}, {"uuid": "7c29a838-f56f-41b7-a06a-aa0c2a6df19d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://thehackernews.com/2025/01/new-aquabot-botnet-exploits-cve-2024.html", "content": "", "creation_timestamp": "2025-01-30T05:41:00.000000Z"}, {"uuid": "88837513-c0f9-4625-9eeb-e4b669656e14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lgytogabxs2n", "content": "", "creation_timestamp": "2025-01-31T01:24:53.026378Z"}, {"uuid": "2eabe08c-a3d5-46de-86fc-8bf344392380", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lhyt2fkfnc2h", "content": "", "creation_timestamp": "2025-02-12T18:38:52.412764Z"}, {"uuid": "606494cb-ea59-49f9-a232-edf3da5a1bf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lgz4osgbzs2n", "content": "", "creation_timestamp": "2025-01-31T04:06:09.033773Z"}, {"uuid": "23340bd6-31dc-44e4-be80-c2e44e224d6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lhz2ymatac22", "content": "", "creation_timestamp": "2025-02-12T21:01:02.390569Z"}, {"uuid": "e23d492a-cb4e-4722-8298-bac67a1b5a43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lhzkiq2gdv2c", "content": "", "creation_timestamp": "2025-02-13T01:38:29.228920Z"}, {"uuid": "c70aea7c-0247-4a7c-a2c4-1f27486145e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113991780823527065", "content": "", "creation_timestamp": "2025-02-12T16:08:59.446096Z"}, {"uuid": "0764e13c-731f-4046-bbd6-a5c09d3b196b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lhyljevnsd2u", "content": "", "creation_timestamp": "2025-02-12T16:24:04.731131Z"}, {"uuid": "717f0a68-8b7b-4f91-a91d-a0929f104ab2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3327114", "content": "", "creation_timestamp": "2025-02-12T18:03:10.307584Z"}, {"uuid": "0a745df7-d955-4cd9-9c89-7048406345a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-12T18:10:02.000000Z"}, {"uuid": "fdd6c82d-9f05-46c6-894e-ac9d37a2b78b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/cecallihelper.bsky.social/post/3lict6b7c322e", "content": "", "creation_timestamp": "2025-02-16T18:07:43.669491Z"}, {"uuid": "a3b04d4d-cd35-4ab6-8515-57aa3795ef60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3li3lk72ngu23", "content": "", "creation_timestamp": "2025-02-13T21:02:32.412740Z"}, {"uuid": "2d9f8c5e-7551-48ad-96ba-e7be49fc42ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "exploited", "source": "https://t.me/BleepingComputer/21458", "content": "\u200aNew Aquabotv3 botnet malware targets Mitel command injection flaw\n\nA new variant of the Mirai-based botnet malware Aquabot has been observed actively exploiting CVE-2024-41710, a command injection vulnerability in Mitel SIP phones. [...]\n\nhttps://www.bleepingcomputer.com/news/security/new-aquabotv3-botnet-malware-targets-mitel-command-injection-flaw/", "creation_timestamp": "2025-01-30T01:32:56.000000Z"}, {"uuid": "715c16da-c7b9-43f4-aba2-12331492ec0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-41710", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/90452e6d-4365-4ec3-a2b6-79dbdbc5575a", "content": "", "creation_timestamp": "2026-02-02T12:26:13.872514Z"}, {"uuid": "1cc02b7f-7bfb-43a5-9296-c7baddf87523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:05.000000Z"}, {"uuid": "4af42185-7501-478a-a732-6e054ac11ae5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "MISP/ca7dfd4e-d0b5-4d10-8982-36d9f6e53c8e", "content": "", "creation_timestamp": "2025-09-01T13:53:38.000000Z"}, {"uuid": "25cc7421-4c81-4ae4-b7b1-c47bdd60f4fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "exploited", "source": "https://t.me/DarkWebInformer_News/277", "content": "\ud83d\udea8 News Alert!\n\nSource: The Hacker News\nTitle: New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks\nLink: https://thehackernews.com/2025/01/new-aquabot-botnet-exploits-cve-2024.html", "creation_timestamp": "2025-01-30T07:43:30.000000Z"}, {"uuid": "83eb8a3f-e74b-4029-b419-610577c3a874", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "Telegram/yaRRF354Ygu4wAwdZLiZFlJ3d4I86LY0KmRJv0c9BGXTfSM", "content": "", "creation_timestamp": "2025-02-24T15:51:22.000000Z"}, {"uuid": "e7490a5e-27f6-47a4-83eb-c5b72beac9b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "exploited", "source": "https://t.me/cibsecurity/82384", "content": "\ud83d\udd8b\ufe0f New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks \ud83d\udd8b\ufe0f\n\nA Mirai botnet variant dubbed Aquabot has been observed actively attempting to exploit a mediumseverity security flaw impacting Mitel phones in order to ensnare them into a network capable of mounting distributed denialofservice DDoS attacks. The vulnerability in question is CVE202441710 CVSS score 6.8, a case of command injection in the boot process that could allow a malicious actor.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-01-30T08:58:45.000000Z"}, {"uuid": "2811599b-ecdf-416c-9f60-1e07da157888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "exploited", "source": "https://t.me/ctinow/230110", "content": "New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks\nhttps://ift.tt/ijtRWBM", "creation_timestamp": "2025-01-30T08:49:24.000000Z"}, {"uuid": "f43a6443-3dcd-4a45-9b40-7992d904f396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "exploited", "source": "https://t.me/MalaysiaHacktivistz/1555", "content": "New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks \u2013 thehackernews.com\n\nThu, 30 Jan 2025 14:41:00", "creation_timestamp": "2025-01-30T09:03:43.000000Z"}, {"uuid": "6024683a-6159-4188-884b-cbdbbf8c0bfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "Telegram/7QLe63I9RKUf4WyhjQ_jW6v9ceXGNFv0G1k2T1cz9MSEfsQn", "content": "", "creation_timestamp": "2025-02-14T10:06:08.000000Z"}, {"uuid": "e1afbf34-17ee-4592-ab22-528de18aebeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "exploited", "source": "Telegram/VuZPxTaj8sX3kyV3UbRUBY78YCESFRIXLfegnJg6r7xEnDQ", "content": "", "creation_timestamp": "2025-01-30T09:03:40.000000Z"}, {"uuid": "7a3b3b39-4e53-45ad-b91d-e8bf926bc316", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "exploited", "source": "Telegram/CgtMp99s8IVrfA6dAfD7nZra4Ge6dUYlZCAqWYcA5TVh1g", "content": "", "creation_timestamp": "2025-01-30T12:47:17.000000Z"}, {"uuid": "b5b21757-d703-499a-b36e-481f88bd3aaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "exploited", "source": "Telegram/-kzXFXF9rWWrCuG5b7uXqGrpJw2UhJ_G_5H4IuvDFR0YxB4", "content": "", "creation_timestamp": "2025-02-01T13:23:52.000000Z"}, {"uuid": "a927d939-e493-4129-abc9-43bee05d8694", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "exploited", "source": "https://t.me/true_secator/6680", "content": "\u041d\u043e\u0432\u044b\u0439 \u0432\u0430\u0440\u0438\u0430\u043d\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0431\u043e\u0442\u043d\u0435\u0442\u0430 Aquabot \u043d\u0430 \u0431\u0430\u0437\u0435 Mirai \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-41710, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0443\u044e \u0432\u043d\u0435\u0434\u0440\u044f\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0432 SIP-\u0442\u0435\u043b\u0435\u0444\u043e\u043d\u044b Mitel.\n\n\u0410\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0434\u0435\u0442\u0435\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 Akamai (SIRT) \u0447\u0435\u0440\u0435\u0437 \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u0443\u044e \u0441\u0435\u0442\u044c \u0445\u0430\u043d\u0438\u043f\u043e\u0442\u043e\u0432 \u0432 \u043d\u0430\u0447\u0430\u043b\u0435 \u044f\u043d\u0432\u0430\u0440\u044f 2025 \u0433\u043e\u0434\u0430, \u043e\u0442\u043c\u0435\u0447\u0430\u044f, \u0447\u0442\u043e \u044d\u0442\u043e \u0443\u0436\u0435 \u0442\u0440\u0435\u0442\u0438\u0439 \u0432\u0430\u0440\u0438\u0430\u043d\u0442 Aquabot, \u043f\u043e\u043f\u0430\u0432\u0448\u0438\u0439 \u0432 \u043f\u043e\u043b\u0435 \u0438\u0445 \u0437\u0440\u0435\u043d\u0438\u044f.\n\n\u0412 \u0442\u0440\u0435\u0442\u0438\u0435\u043c \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0435, Aquabotv3, \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u0443\u043d\u0438\u0447\u0442\u043e\u0436\u0435\u043d\u0438\u044f \u0441 \u0441\u0438\u0433\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043d\u0430 C2, \u0447\u0442\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0432\u0441\u0435\u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0439 \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433.\n\nCVE-2024-41710 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434 \u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 SIP-\u0442\u0435\u043b\u0435\u0444\u043e\u043d\u044b Mitel \u0441\u0435\u0440\u0438\u0439 6800, 6900 \u0438 6900w, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u0431\u044b\u0447\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0441\u0440\u0435\u0434\u0430\u0445 \u0438 \u0433\u043e\u0441\u0443\u0447\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f\u0445.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u043f\u0440\u043e\u0432\u0435\u0441\u0442\u0438 \u0430\u0442\u0430\u043a\u0443 \u043f\u0443\u0442\u0435\u043c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0430\u0440\u0433\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0438\u0437-\u0437\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043e\u0447\u0438\u0441\u0442\u043a\u0438 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u043e\u0432 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0439 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\n\nMitel \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u00a0\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u0434\u043b\u044f \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 17 \u0438\u044e\u043b\u044f 2024 \u0433\u043e\u0434\u0430. \u0414\u0432\u0435 \u043d\u0435\u0434\u0435\u043b\u0438 \u0441\u043f\u0443\u0441\u0442\u044f \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u041a\u0430\u0439\u043b \u0411\u0435\u0440\u043d\u0441 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b PoC \u043d\u0430 GitHub.\n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e \u0434\u043b\u044f \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u0430\u0442\u0430\u043a \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f, \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0431\u043e\u0442\u043d\u0435\u0442, \u043f\u043e \u0432\u0441\u0435\u0439 \u0432\u0438\u0434\u0438\u043c\u043e\u0441\u0442\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0431\u0440\u0443\u0442 \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0441\u043e\u0437\u0434\u0430\u044e\u0442 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441 POST, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0439 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u0443\u044e \u043a\u043e\u043d\u0435\u0447\u043d\u0443\u044e \u0442\u043e\u0447\u043a\u0443 8021xsupport.html, \u043e\u0442\u0432\u0435\u0447\u0430\u044e\u0449\u0443\u044e \u0437\u0430 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 802.1x \u0432 SIP-\u0442\u0435\u043b\u0435\u0444\u043e\u043d\u0430\u0445 Mitel.\n\n\u041f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u043e\u0431\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u0435\u0442 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0434\u0430\u043d\u043d\u044b\u0435, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u0441\u0442\u0430\u0432\u043b\u044f\u0442\u044c \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0432 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0443\u044e \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044e \u0442\u0435\u043b\u0435\u0444\u043e\u043d\u0430 (/nvdata/etc/local.cfg).\n\n\u0421 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u0441\u0438\u043c\u0432\u043e\u043b\u043e\u0432 \u043a\u043e\u043d\u0446\u0430 \u0441\u0442\u0440\u043e\u043a\u0438 (%dt \u2192 %0d) \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u0443\u044e\u0442 \u0442\u0435\u043c, \u043a\u0430\u043a \u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0444\u0430\u0439\u043b \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430, \u0447\u0442\u043e\u0431\u044b \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u0441\u043a\u0440\u0438\u043f\u0442 \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0438 (bin.sh) \u0441\u043e \u0441\u0432\u043e\u0435\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430.\n\n\u0412 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u0441\u043a\u0440\u0438\u043f\u0442 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442 \u0438 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443 Aquabot \u0434\u043b\u044f \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b (x86, ARM, MIPS \u0438 \u0442.\u0434.), \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442 \u0435\u0435 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u044f \u043d\u0430 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u00abchmod 777\u00bb, \u0430 \u0437\u0430\u0442\u0435\u043c \u0437\u0438\u0447\u0438\u0449\u0430\u0435\u0442 \u0432\u0441\u0435 \u0441\u043b\u0435\u0434\u044b.\n\n\u041f\u043e\u0441\u043b\u0435 \u0434\u043e\u0441\u0442\u0438\u0436\u0435\u043d\u0438\u044f \u0443\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u0441\u0442\u0438 Aquabotv3 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u043a C2 \u0447\u0435\u0440\u0435\u0437 TCP \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0439, \u043a\u043e\u043c\u0430\u043d\u0434 \u0430\u0442\u0430\u043a\u0438, \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u043b\u0438 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0445 \u043d\u0430\u0433\u0440\u0443\u0437\u043e\u043a.\n\n\u0417\u0430\u0442\u0435\u043c \u043f\u044b\u0442\u0430\u0435\u0442\u0441\u044f \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c\u0441\u044f \u043d\u0430 \u0434\u0440\u0443\u0433\u0438\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 IoT, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 Mitel, CVE-2018-17532 (TP-Link), CVE-2023-26801 (RCE \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438 IoT), CVE-2022-31137 (RCE \u0432\u0435\u0431-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f), RCE Linksys E-series, Hadoop YARN \u0438 CVE-2018-10562 - 10561 (\u0432 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430\u0445 Dasan).\n\n\u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0430\u044f \u041f\u041e \u0442\u0430\u043a\u0436\u0435 \u043f\u044b\u0442\u0430\u0435\u0442\u0441\u044f \u0432\u0437\u043b\u043e\u043c\u0430\u0442\u044c \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0435 \u0438\u043b\u0438 \u0441\u043b\u0430\u0431\u044b\u0435 \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 SSH/Telnet, \u0447\u0442\u043e\u0431\u044b \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c\u0441\u044f \u043d\u0430 \u043f\u043b\u043e\u0445\u043e \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0432 \u0442\u043e\u0439 \u0436\u0435 \u0441\u0435\u0442\u0438.\n\n\u041e\u0441\u043d\u043e\u0432\u043d\u043e\u0439 \u0446\u0435\u043b\u044c\u044e Aquabotv3 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u043e\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0432 DDoS, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0438\u0445 \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0430\u0442\u0430\u043a TCP SYN, TCP ACK, UDP, GRE IP \u0438 \u0430\u0442\u0430\u043a \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439.\n\n\u041e\u043f\u0435\u0440\u0430\u0442\u043e\u0440 \u0431\u043e\u0442\u043d\u0435\u0442\u0430 \u043f\u0440\u043e\u0434\u0432\u0438\u0433\u0430\u0435\u0442 \u0441\u0432\u043e\u0438 \u0443\u0441\u043b\u0443\u0433\u0438 \u0432 Telegram \u043f\u043e\u0434 \u0431\u0440\u0435\u043d\u0434\u0430\u043c\u0438 Cursinq Firewall, The Eye Services \u0438 The Eye Botnet, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u0435\u0433\u043e \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430 \u0434\u043b\u044f \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043c\u0435\u0440 \u043f\u043e \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439 DDoS-\u0430\u0442\u0430\u043a.\n\n\u0421\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 Aquabotv3 IoC, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0430\u0432\u0438\u043b\u0430 Snort \u0438 YARA \u0434\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e - \u0432 \u043e\u0442\u0447\u0435\u0442\u0435.", "creation_timestamp": "2025-01-30T18:40:05.000000Z"}, {"uuid": "fb055d21-8905-412c-85fc-6824da6c7dc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://t.me/cvedetector/2885", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41710 - Mitel SIP Phones Insufficient Parameter Sanitization Argument Injection\", \n  \"Content\": \"CVE ID : CVE-2024-41710 \nPublished : Aug. 12, 2024, 7:15 p.m. | 35\u00a0minutes ago \nDescription : A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-12T21:51:10.000000Z"}, {"uuid": "1f95e121-b272-4e59-b2ce-ea58dd5f27d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "exploited", "source": "https://t.me/MalaysiaHacktivistz/7743", "content": "New Aquabot Botnet Exploits CVE-2024-41710 in Mitel Phones for DDoS Attacks \u2013 thehackernews.com\n\nThu, 30 Jan 2025 14:41:00", "creation_timestamp": "2025-01-30T09:03:43.000000Z"}, {"uuid": "bea34772-9c86-47f3-a7d4-10d47fbe114b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11757", "content": "#exploit \n1. CVE-2024-12847:\nExposing an Old Netgear Vulnerability Still Active in 2025\n\n2. RCE in Lightning AI-development platform\n\n3. CVE-2024-41710:\nMitel phones Argument Injection\n\n3. CVE-2024-46507:\nYETI platform SSTI", "creation_timestamp": "2025-03-18T12:15:38.000000Z"}, {"uuid": "9e80d66b-3aaa-4580-a592-11394d0265ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "exploited", "source": "https://t.me/thehackernews/6254", "content": "\u26a0\ufe0f New Mirai Botnet Variant Aquabot Targets CVE-2024-41710 in Mitel Phones for DDoS Attacks.\n\nThe flaw affects Mitel 6800, 6900, 6900w phones and Mitel 6970 Conference Units. Attackers have been exploiting CVE-2024-41710 since January 2025.\n\nAttackers are using Telegram to sell DDoS services\u2014this threat is already commercialized.\n\nLearn more: https://thehackernews.com/2025/01/new-aquabot-botnet-exploits-cve-2024.html", "creation_timestamp": "2025-01-30T07:51:51.000000Z"}, {"uuid": "a0b66c02-204d-468a-bdb0-a4f89c329e44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "exploited", "source": "https://t.me/xakep_ru/17029", "content": "\u0411\u043e\u0442\u043d\u0435\u0442 Aquabot \u043d\u0430\u0446\u0435\u043b\u0435\u043d \u043d\u0430 \u0442\u0435\u043b\u0435\u0444\u043e\u043d\u044b Mitel\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d \u043d\u043e\u0432\u044b\u0439 \u0432\u0430\u0440\u0438\u0430\u043d\u0442 \u043c\u0430\u043b\u0432\u0430\u0440\u0438 Aquabot, \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u043d\u0430 \u043a\u043e\u0434\u0435 Mirai. \u0411\u043e\u0442\u043d\u0435\u0442 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 CVE-2024-41710, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0443\u044e \u0441 \u0438\u043d\u044a\u0435\u043a\u0446\u0438\u044f\u043c\u0438 \u043a\u043e\u043c\u0430\u043d\u0434 \u0432 SIP-\u0442\u0435\u043b\u0435\u0444\u043e\u043d\u0430\u0445 Mitel.\n\nhttps://xakep.ru/2025/01/30/new-aquabot/", "creation_timestamp": "2025-01-30T18:32:18.000000Z"}, {"uuid": "216ed06f-1a47-4596-9597-42e779299448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-41710", "type": "exploited", "source": "https://t.me/CybNux/7572", "content": "\u26a0\ufe0f \u064a\u0633\u062a\u0647\u062f\u0641 \u0645\u062a\u063a\u064a\u0631 \u062c\u062f\u064a\u062f \u0645\u0646 \u0634\u0628\u0643\u0629 Mirai Botnet \u0628\u0631\u0646\u0627\u0645\u062c Aquabot CVE-2024-41710 \u0641\u064a \u0647\u0648\u0627\u062a\u0641 Mitel \u0644\u0647\u062c\u0645\u0627\u062a DDoS.\n\n\u064a\u0624\u062b\u0631 \u0627\u0644\u062e\u0644\u0644 \u0639\u0644\u0649 \u0647\u0648\u0627\u062a\u0641 Mitel 6800 \u06486900 \u06486900w \u0648\u0648\u062d\u062f\u0627\u062a \u0627\u0644\u0645\u0624\u062a\u0645\u0631\u0627\u062a Mitel 6970. \u0648\u0642\u062f \u0627\u0633\u062a\u063a\u0644 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u0648\u0646 CVE-2024-41710 \u0645\u0646\u0630 \u064a\u0646\u0627\u064a\u0631 2025.\n\n\u064a\u0633\u062a\u062e\u062f\u0645 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u0648\u0646 \u062a\u0637\u0628\u064a\u0642 Telegram \u0644\u0628\u064a\u0639 \u062e\u062f\u0645\u0627\u062a DDoS\u060c \u0648\u0642\u062f \u062a\u0645 \u0628\u0627\u0644\u0641\u0639\u0644 \u062a\u0633\u0648\u064a\u0642 \u0647\u0630\u0627 \u0627\u0644\u062a\u0647\u062f\u064a\u062f.\n\n#\u0623\u062e\u0628\u0627\u0631", "creation_timestamp": "2025-01-30T07:57:51.000000Z"}]}