Article Details

Scrape Timestamp (UTC): 2023-11-01 20:06:21.828

Source: https://www.theregister.com/2023/11/01/mozi_botnet_kill_switch/

Original Article Text

Click to Toggle View

Mozi botnet murder mystery: China or criminal operators behind the kill switch?. Middle Kingdom or self-immolation - there are a couple of theories. The Mozi botnet has all but disappeared, according to security folks who first noticed the prolific network's slowdown and then uncovered a kill switch for the IoT system. But they still have one unanswered question: "Who killed Mozi?" Mozi, which emerged in late 2019 and soon after accounted for 90 percent of all malicious IoT network traffic, quickly gained notoriety as it exploited vulnerabilities in hundreds of thousands of connected devices each year.  But then this August, the criminal network's activity took "a sudden and unanticipated nosedive," according to ESET Research, which on Wednesday said its team found an activated killswitch to "put the IoT zombie botnet in its grave." They spotted the slowdown first in India on August 8, and then in China on August 16. A little over a month later, ESET found the the control payload inside a user datagram protocol (UDP) message that acted as the kill switch and had some interesting extra functionality. The command stopped the Mozi malware, disabled some system services, replaced the original application file, reordered some router/device configuration commands, and disabled access to various ports. "The person behind the takedown sent the control payload eight times, each time instructing the bot to download and install an update of itself via HTTP," ESET malware researchers Ivan Bešina, Michal Škuta, and Miloš Čermák wrote.  Despite stripping the malware of its capabilities, Mozi bots still maintained persistence, the trio added. They also note that the kill switch code shares some code snippets with the original botnet, and whomever flipped the switch to take down Mozi used the correct private keys to sign the payload. This all led the security shop to two theories about who is behind the IoT bot's shut down. "There are two potential instigators for this takedown: the original Mozi botnet creator or Chinese law enforcement, perhaps enlisting or forcing the cooperation of the original actor or actors," Bešina said in a statement.  "The sequential targeting of India and then China suggests that the takedown was carried out deliberately, with one country targeted first and the other a week later," he continued. The team says the investigation is ongoing, and the researchers will publish a more detailed analysis in the coming months. Of course, whether the IoT zombie botnet will stay dead remains to be seen, they have a habit of returning from the grave.

Daily Brief Summary

CYBERCRIME // Mysterious Kill Switch Deactivates Prolific Mozi Botnet

Security researchers at ESET have found a kill switch that has sharply slowed and possibly ended activity of the Mozi botnet, which accounted for nearly 90% of malicious internet of things (IoT) network traffic. It exploited hundreds of thousands of devices each year.

The activity of the botnet started slowing down in India on 8 August and in China on 16 August. By the end of September, researchers discovered a control payload within a user datagram protocol (UDP) message that acted as the kill switch.

The control payload was deployed eight times, requiring the bot to download and install an update via HTTP. This stopped the Mozi malware, disabled some features and commands, and shut down access to various ports.

Despite the kill switch, the Mozi bots maintained persistence but were stripped of their malicious capabilities.

ESET researchers are proposing two possible theories about who disabled the botnet: the original creator or Chinese law enforcement, possibly through coercion of the original team.

The investigation is ongoing, and a more detailed analysis is expected in the coming months. The question about whether the botnet will stay inactive still remains.