
| Names | DDG | |
| Category | Malware | |
| Type | Miner | |
| Description | (Qihoo 360) DDG uses a C2 and HUB layout to communicate with its clients. The HUB is a set of IPs and domain names that are used to provide Miner program for the compromised clients to download. | |
| Information | <https://blog.netlab.360.com/ddg-a-mining-botnet-aiming-at-database-server-en/> <https://blog.netlab.360.com/ddg-mining-botnet-jin-qi-huo-dong-fen-xi/> <https://blog.netlab.360.com/threat-alert-ddg-3013-is-out/> <https://blog.netlab.360.com/ddg-botnet-round-x-is-there-an-ending/> <https://blog.netlab.360.com/old-botnets-never-die-and-ddg-refuse-to-fade-away/> | |
| Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/elf.ddg> | |
| AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:DDG> | |
Last change to this tool card: 28 December 2021
Download this tool card in JSON format
| Changed | Name | Country | Observed | ||
Other groups | |||||
| Pacha Group | 2018-May 2019 | ||||
1 group listed (0 APT, 1 other, 0 unknown)
|
Digital Service Security Center Follow us on |
Report incidents |
|
| +66 (0)2-123-1227 | ||
| [email protected] | ||