
While the increase in data began in December, our data shows that the use of the Mozi filename began earlier, in September. Research revealed that these hosts were part of a growing P2P botnet and were making the Mozi files available for distribution to newly infected hosts. File names such as "Mozi.m" and "Mozi.a" were seen throughout all of the identified hosts. Upon review of these entries we began to see a pattern develop, each host had an http server listening on a random port that served a file which included "Mozi" in the name. Since this malware family has not changed in some time, the increase was unexpected, and led to further investigation of the increase. In December 2019, Black Lotus Labs observed an increase of entries of compromised hosts in our reputation system labelled as IoT Reaper.

The malware targets IoT devices, predominantly routers and DVRs that are either unpatched or have weak telnet passwords.
#Is vacron viewer malware code
Mozi is evolved from the source code of several known malware families – Gafgyt, Mirai and IoT Reaper – that have been brought together to form a peer-to-peer (P2P) botnet capable of DDoS attacks, data exfiltration and command or payload execution.
