Diicot

Threat Actor updated 23 days ago (2024-11-29T14:11:49.823Z)
Download STIX
Preview STIX
The Diicot Threat Group, an emerging threat actor with sophisticated technical knowledge, has been identified as a significant cybersecurity concern. They have recently targeted SSH servers with brute-force malware, using a relatively limited username/password list consisting of default and easily-guessed credential pairs. The group's campaigns typically involve a long execution chain, where individual payloads and their outputs form interdependent relationships. The group has also launched a cryptominer on machines with more than four cores, while machines with four or less cores execute the "SlowAndSteady" option. This activity follows a renewed Romanian cryptojacking campaign named Diicot (previously Mexals), which uses a Golang-based Secure Shell (SSH) worm module and a new LAN spreader for propagation. Diicot is a Romanian law enforcement agency that investigates and prosecutes organized crime, cybercrime, terrorism-related offences, drug trafficking, and financial crimes. However, in this context, it appears to be the moniker used by the threat actor group. In June, DIICOT appealed to judges to prolong the house arrest procedure for two brothers implicated in cybercrime activities. These individuals, based in Romania for several years, were arrested in December alongside two women as part of a DIICOT investigation into allegations they had trafficked women into making online webcam pornography through the so-called “loverboy” grooming method. In a recent development, DIICOT conducted raids on six properties in pursuit of a hacktivist group behind a campaign dubbed “Operation Romania.” The raids took place in the cities of Buzau and Vaslui, and in Bistrita-Nasaud county, leading to the arrest of eight people. The accused were charged with forming an organized criminal group, illegal access to a computer system, and unauthorized transfer of computer data. Despite these actions, support for the group seems to be growing, with footage circulating of young men chanting “Free Top G” and using a hand gesture associated with one of the arrested individuals, Andrew Tate, as a symbol of support online.
Description last updated: 2024-05-04T19:33:19.000Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Mexals is a possible alias for Diicot. Mexals, now known as Diicot, is a threat actor that has been active since at least 2021. This group exhibits extensive technical knowledge and pursues a wide variety of objectives. As a threat actor, Diicot may consist of an individual, a private company, or a government entity, all capable of execu
2
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Discord
Botnet
Cybercrime
Bot
Linux
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The Mirai Malware is associated with Diicot. Mirai is a type of malware that primarily targets Internet of Things (IoT) devices, converting them into a botnet, which is then used to launch Distributed Denial of Service (DDoS) attacks. In early 2022, Mirai botnets accounted for over seven million detections worldwide, though there was a 9% quarUnspecified
2
The Cayosin Malware is associated with Diicot. Cayosin is a type of malware, a harmful software designed to exploit and damage computer systems or devices. It has been deployed by the Diicot cybercrime group in a new campaign, according to research from Cado Labs. Traditionally associated with cryptojacking campaigns, Diicot has shifted tactics,Unspecified
2