A new malware campaign attributed to the Romanian-speaking Diicot threat group has been discovered targeting Linux systems. The campaign shows significant advancements compared to previous iterations, including modified UPX headers with corrupted checksums, advanced payload staging, and environment-specific behavior. The malware targets Linux machines running OpenSSH, exploiting weak credentials for access. It employs various techniques such as file obfuscation, reverse shell capabilities, persistence mechanisms, and command and control communication. The campaign also includes SSH brute force functionality and potential cryptojacking capabilities. The attackers have earned over $16,000 from Monero mining alone. Author: AlienVault
Related Tags:
T1110.001
T1053.003
T1027.002
brute-force
openssh
XMRig
UPX
persistence
linux
Associated Indicators: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