home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 326 of 2,445   
   Mike Powell to All   
   Watch out, your office ph   
   31 Jan 25 10:29:00   
   
   TZUTC: -0500   
   MSGID: 30.consprcy@1:2320/105 2c022493   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Watch out, your office phone could be hijacked into a Mirai botnet   
      
   Date:   
   Thu, 30 Jan 2025 15:29:00 +0000   
      
   Description:   
   Hackers are abusing a flaw in Mitel phones to run DDoS attacks, report claims.   
      
   FULL STORY   
      
   Security researchers from Akamai have caught a new variant of the infamous   
   Mirai botnet targeting business phone devices built by Mitel.    
      
   Mitel provides business communication solutions, including VoIP , unified   
   communications, and contact center services, but according to Akamai, the   
   devices - namely Mitel 6800, 6900, and 6900w series of SIP desk phones,   
   together with the 6970 Conference Unit, running on firmware R6.4.0.HF1   
   (R6.4.0.136) - are vulnerable to a command injection flaw tracked as   
   CVE-2024-41710.    
      
   This is a medium-severity bug (6.8/10) that allows an attacker to execute   
   arbitrary commands within the context of the system.   
      
   Reporting counter-attacks   
      
   A threat actor took advantage of this flaw to deploy Aquabotv3, a new variant   
   of Mirai, arguably the most destructive botnet out there. Aquabot allows its   
   operators to run Distributed Denial of Service (DDoS) attacks.    
      
   This version also comes with a unique and uncommon feature that most likely   
   serves to help threat actors track the health of the botnet. When a victim   
   spots the malware on its device and tries to remove it, Aquabot will react    
   and send the information about the attempt back to its command & control (C2)   
   server.    
      
   The best way to defend against Aquabot and other Mirai variants is to keep    
   the endpoints updated. Mitel patched this particular vulnerability in July   
   2024, so if youre using these phones in your organization, make sure to apply   
   the patch to mitigate any risks.    
      
   Mirai and its variants continue to wreak havoc across cyberspace. In the last   
   30 days alone, there have been multiple news reports of different Mirai   
   variants being spotted in the wild. For example, researchers from Juniper   
   recently warned about a Mirai variant in late December 2024, and in early   
   January 2025, Chinese researchers discovered a variant of Mirai with an   
   offensive name targeting industrial routers.    
      
    Via The Register   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/watch-out-your-office-phone-could-be-hi   
   jacked-into-a-mirai-botnet   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca