Mysterious Kill Switch Disrupts the Notorious Mozi IoT Botnet


As of August 2023, one of the most notorious IoT Botnets called “Mozi” vanished from their activities. Mozi Botnet had been exploiting hundreds of thousands of IoT devices.

In the year 2023, a strange phenomenon occurred where a certain type of object began to disappear without explanation. The disappearance started in India on August 8th and then spread to China on August 16th. The sudden vanishing of these objects left many people puzzled and concerned.

EHA

Analyzing further, a Kill Switch was discovered with a user datagram protocol (UDP) message. The person responsible for this takedown used the kill switch eight times, instructing the bot to download and install an update via HTTP.

Kill Switch Functionalities

Researching further, the kill switch demonstrated several functionalities such as the parent process, disabling sshd and dropbear services, replacing the original Mozi file with itself, executing configuration commands, disabling access to various ports, and establishing the same foothold as the replaced original Mozi file.



Document

FREE Webinar

Ensure your Cyber Resiliance with the recent wave of cyber-attacks targeting the financial services sector. Almost 60% respondents not confident to recover fully from a cyber attack.


The kill switch showed a strong connection between the botnet’s source code and most recently used binaries. Additionally, it also shows the use of correct private keys to sign the control payload.

Mysterious Kill Switch Disrupts Mozi
Botnet activity (Source: ESET)

Who Initiated the Kill Switch?

There are no confirmed reports on who took down Mozi Botnet. However, some hypotheses suggest that the kill switch might have been initiated by the Mozi botnet creators or Chinese law enforcement forcing the cooperation of the creators, reads the ESET report.

Nevertheless, the fall of one of the most notorious botnets provides a lot of information about the creation, operation, and termination of botnets in the wild. 

Indicators of Compromise

Files

SHA-1 Filename Detection Description
758BA1AB22DD37F0F9D6FD09419BFEF44F810345 mozi.m Linux/Mozi.A Original Mozi bot.
9DEF707F156DD4B0147FF3F5D1065AA7D9F058AA ud.7 Linux/Mozi.C Mozi bot kill switch.

Network

IP Domain Hosting provider First seen Details
157.119.75[.]16 N/A AS135373 EFLYPRO-AS-AP EFLY NETWORK LIMITED 2023-09-20 Kill switch hosting server

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.



Source link