Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Diicot Campaign Targeting Linux Environments

Type
Campaign
Actors
Diicot
Pub. date
December 17, 2024
Initial access
Password attack
Impact
Resource hijacking
Observed techniques
SSH bruteforcingReverse shellMisconfigured SSH abuse
Targeted technologies
Linux
References
https://www.wiz.io/blog/diicot-threat-group-malware-campaign
Status
Finalized
Last edited
Jan 2, 2025 12:12 PM

Wiz Research uncovered a sophisticated malware campaign by the Romanian-speaking Diicot threat group targeting Linux systems, especially in cloud environments. This campaign demonstrates notable advancements over previous iterations, such as corrupted UPX headers, cloud-specific payload behavior, and improved persistence mechanisms. Diicot, previously documented for its use of self-propagating tools, cryptomining malware, and evasion techniques, has further refined its capabilities, adapting to modern defenses and leveraging insights from threat intelligence. Their new malware variants include cloud-aware payloads that prioritize spreading in cloud environments and deploy cryptominers in traditional setups, emphasizing the attackers’ strategy to exploit both environments efficiently.

Key features of this campaign include the use of HTTP-based C2 communication, advanced brute-force techniques to exploit weak SSH credentials, and modular payloads with reverse shell and scanning capabilities. Evidence from attacker-controlled servers reveals a significant focus on cryptomining, with over $16,000 traced to Monero mining alone. The campaign's infrastructure has been active since October 2024, with frequent updates to evade detection.

Made with 💙 by Wiz

Last Updated: April 3, 2025