Article Details
Scrape Timestamp (UTC): 2023-11-02 14:34:03.138
Source: https://thehackernews.com/2023/11/mysterious-kill-switch-disrupts-mozi.html
Original Article Text
Click to Toggle View
Mysterious Kill Switch Disrupts Mozi IoT Botnet Operations. The unexpected drop in malicious activity connected with the Mozi botnet in August 2023 was due to a kill switch that was distributed to the bots. "First, the drop manifested in India on August 8," ESET said in an analysis published this week. "A week later, on August 16, the same thing happened in China. While the mysterious control payload – aka kill switch – stripped Mozi bots of most functionality, they maintained persistence." Mozi is an Internet of Things (IoT) botnet that emerged from the source code of several known malware families, such as Gafgyt, Mirai, and IoT Reaper. First spotted in 2019, it's known to exploit weak and default remote access passwords as well as unpatched security vulnerabilities for initial access. In September 2021, cybersecurity firm Netlab researchers disclosed the arrest of the botnet operators by Chinese authorities. But the precipitous decline in Mozi activity – from around 13,300 hosts on August 7 to 3,500 on August 10 – is said to be the result of an unknown actor transmitting a command instructing the bots to download and install an update designed to neutralize the malware. Specifically, the kill switch demonstrated capabilities to terminate the malware's process, disable system services such as SSHD and Dropbear, and ultimately replace Mozi with itself. "Despite the drastic reduction in functionality, Mozi bots have maintained persistence, indicating a deliberate and calculated takedown," security researchers Ivan Bešina, Michal Škuta, and Miloš Čermák said. A second variant of the control payload came fitted with minor changes, including a feature to ping a remote server, likely for statistical purposes. What's more, the kill switch exhibits a strong overlap with the botnet's original source code and is signed with the correct private key, "There are two potential instigators for this takedown: the original Mozi botnet creator or Chinese law enforcement, perhaps enlisting or forcing the cooperation of the original actor or actors," Bešina said. "The sequential targeting of India and then China suggests that the takedown was carried out deliberately, with one country targeted first and the other a week later."
Daily Brief Summary
The Mozi Internet of Things (IoT) botnet experienced a sudden drop in malicious activity in August 2023, due to a kill switch distributed to its bots.
The decrease was first observed in India on August 8, followed by China a week later where a control payload, similar to a kill switch, was activated.
While the kill switch made the bots largely nonfunctional, they maintained persistence, indicating a purposeful and planned neutralisation.
The drop in Mozi botnet activity
from circa 13,300 hosts to about 3,500 over a few days
is believed to be due to an unknown actor sending a command to bots to download and install an update that neutralises the malware.
There are conjectures that the takedown could have been initiated by the botnet's original creator or Chinese authorities, perhaps in conjunction with the original actor(s).
A second version of the control payload also emerged with minor modifications, such as pinging a remote server, likely for tracking purposes. This kill switch shares a strong similarity with the botnet's original source code and was signed with the correct private key.