Diicot

Threat Actor Profile Updated 3 months ago
Download STIX
Preview STIX
The Diicot Threat Group, an emerging threat actor with sophisticated technical knowledge, has been identified as a significant cybersecurity concern. They have recently targeted SSH servers with brute-force malware, using a relatively limited username/password list consisting of default and easily-guessed credential pairs. The group's campaigns typically involve a long execution chain, where individual payloads and their outputs form interdependent relationships. The group has also launched a cryptominer on machines with more than four cores, while machines with four or less cores execute the "SlowAndSteady" option. This activity follows a renewed Romanian cryptojacking campaign named Diicot (previously Mexals), which uses a Golang-based Secure Shell (SSH) worm module and a new LAN spreader for propagation. Diicot is a Romanian law enforcement agency that investigates and prosecutes organized crime, cybercrime, terrorism-related offences, drug trafficking, and financial crimes. However, in this context, it appears to be the moniker used by the threat actor group. In June, DIICOT appealed to judges to prolong the house arrest procedure for two brothers implicated in cybercrime activities. These individuals, based in Romania for several years, were arrested in December alongside two women as part of a DIICOT investigation into allegations they had trafficked women into making online webcam pornography through the so-called “loverboy” grooming method. In a recent development, DIICOT conducted raids on six properties in pursuit of a hacktivist group behind a campaign dubbed “Operation Romania.” The raids took place in the cities of Buzau and Vaslui, and in Bistrita-Nasaud county, leading to the arrest of eight people. The accused were charged with forming an organized criminal group, illegal access to a computer system, and unauthorized transfer of computer data. Despite these actions, support for the group seems to be growing, with footage circulating of young men chanting “Free Top G” and using a hand gesture associated with one of the arrested individuals, Andrew Tate, as a symbol of support online.
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Mexals
2
Mexals, now known as Diicot, is a threat actor that has been active since at least 2021. This group exhibits extensive technical knowledge and pursues a wide variety of objectives. As a threat actor, Diicot may consist of an individual, a private company, or a government entity, all capable of execu
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Cybercrime
Botnet
Bot
Discord
Linux
Denial of Se...
Trafficking
Cryptominer
Malware
SSH
Romanian
Chrome
Ddos
denial-of-se...
Payload
Worm
Loader
Tool
Maas
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
MiraiUnspecified
2
Mirai is a type of malware that primarily targets Internet of Things (IoT) devices to form botnets, which are networks of private computers infected with malicious software and controlled as a group without the owners' knowledge. In early 2022, Mirai botnets accounted for over 7 million detections g
CayosinUnspecified
2
Cayosin is a type of malware, a harmful software designed to exploit and damage computer systems or devices. It has been deployed by the Diicot cybercrime group in a new campaign, according to research from Cado Labs. Traditionally associated with cryptojacking campaigns, Diicot has shifted tactics,
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Source Document References
Information about the Diicot Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
CERT-EU
a year ago
Linux Cryptomining Attack Color1337
CERT-EU
a year ago
Andrew Tate, Brother Plead for House Arrest During Romanian Trial
CERT-EU
a year ago
‘Pro-Andrew Tate Hackers’ Arrested in String of Raids
CERT-EU
a year ago
Hackers Hiding DcRAT Malware in Fake OnlyFans Content
CERT-EU
a year ago
Diicot cybercrime gang expands its attack capabilitiesSecurity Affairs | #cybercrime | #infosec | National Cyber Security Consulting
CERT-EU
a year ago
Beware: 1,000+ Fake Cryptocurrency Sites Trap Users in Bogus Rewards Scheme
CERT-EU
a year ago
Romanian cybercrime gang Diicot builds DDoS botnet with Mirai variant
Securityaffairs
a year ago
Diicot cybercrime gang expands its attack capabilities
CERT-EU
a year ago
From Cryptojacking to DDoS Attacks: Diicot Expands Tactics with Cayosin Botnet – GIXtools
CERT-EU
a year ago
New Diicot Threat Group Targets SSH Servers with Brute-Force Malware
CERT-EU
a year ago
New Diicot Threat Group Targets SSH Servers with Brute-Force Malware | IT Security News
CERT-EU
a year ago
New Diicot Threat Group Targets SSH Servers with Brute-Force Malware