Home > Cyber News > DDG Monero Mining Botnet Targets Redis and OrientDB Servers
CYBER NEWS

DDG Monero Mining Botnet Targets Redis and OrientDB Servers

A new botnet carrying out large-scale attacks has been discovered by security researchers. The botnet is dubbed DDG and is proclaimed the second biggest mining botnet ever. Its targets are the Redis and OrientDB servers.

DDG.Mining.Botnet Attacks Description

A couple of months ago Netlab researchers noticed a large-scale ongoing scan that was targeting OrientDB databases. After a further analysis, the researchers uncovered that this is “a long-running botnet” which is aimed at mining Monero. Netlab named the botnet DDG.Mining.Botnet after its core function module.

According to statistics, the botnet has mined more than 3,395 Monero which amounts to more than $920,000, making it the second largest Monero botnet after the MyKings botnet.

The botnet has been active at least since late 2016 and had been updated thoroughly during the course of 2017.

DDG uses a C2 and HUB layout to communicate with its clients. The HUB is a set of IPs and domain names that are used to provide Miner program for the compromised clients to download.

Researchers also note that they were able to register and sinkhole two domain names which were deployed by the botnet’s v2011. Thanks to this activity, it was possible for them to have a close look at the entire DDG botnet structure.

DDG Botnet Monero Mining Activities

The botnet uses https://monero.crypto-pool.fr/ as its mining pool, and three Monero wallets:

  • Wallet #14AxgKJtp8TTN9Ab9JLnvg7BxZ7Hnw4hxigg35LrDVXbKdUxmcsXPEKU3SEUQxeSFV3bo2zCD7AiCzP2kQ6VHouK3KwnTKYg
  • Wallet #245XyPEnJ6c2STDwe8GXYqZTccoHmscoNSDiTisvzzekwDSXyahCUmh19Mh2ewv1XDk3xPj3mN2CoDRjd3vLi1hrz6imWBR1
  • Wallet #344iuYecTjbVZ1QNwjWfJSZFCKMdceTEP5BBNp4qP35c53Uohu1G7tDmShX1TSmgeJr2e9mCw2q1oHHTC2boHfjkJMzdxumM

Apparently, the pool made it possible for the researchers to check the payments of the wallets – a total of 3,395 Monero.

The DDG botnet exploits the following remote code execution flaw: CVE-2017-11467. Through this exploitation in the form of a brute-force attack, the botnet operators are successfully compromising the above-mentioned servers. What is troublesome is that the cybercriminals behind this operation are targeting servers with powerful computing capabilities.

As for the attack itself, it follows this frame:

  • Initial Scanning: Cybercriminals are exploiting the known RCE vulnerability of the OrientDB database to drop the attack payload;
  • Stage 1: Cybercriminals are modifying local Crontab scheduled tasks, downloading and executing i.sh (hxxp: //218.248.40.228:8443/i.sh) on the primary server to keep it synchronized every 5 minutes;
  • Stage 2: DDG traverses the built-in file hub_iplist.txt, then it checks the connectivity of every single entry and tries to download the corresponding Miner program wnTKYg;
  • Mining Stage: The miner program is initiated, using the computing resources of the compromised host to begin mining for the cybercriminals’s wallet.


It is highly recommended for computer users to scan their system for active infections and malware using an anti-malware program. Such a program serves to prevent many malicious actions and stop further distribution of malware.

Download

Malware Removal Tool


SpyHunter scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool.Find Out More About SpyHunter Anti-Malware Tool / How to Uninstall SpyHunter

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree