-
Notifications
You must be signed in to change notification settings - Fork 199
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Incident Report: Potential Crypto Mining Attack via ComfyUI/Ultralytics #843
Comments
The models the comfyui extension subpack downloaded are malicious. |
The ultralytics package on PyPi seems to be compromised, please do not download it. We have notified the team about it. |
Hi @Skillnoob. Thank you for your response and alert. Unfortunately, I had already downloaded and run the package before realizing the situation. My initial goal was to recreate my girlfriend's face using Ultralytics, but I ended up running into this problem. I would like to know how I should proceed from here to ensure that my system is secure and that nothing has been compromised. I am also available to provide logs or any other information that may help in investigating and resolving the issue. If there is anything specific I can do to help, please let me know. |
@otupa Currently from what we know, only the pip install git+https://github.com/ultralytics/ultralytics.git |
Thank You and a Few Questions About Installing the Impact Pack First, thank you for your efforts in clarifying these issues and for providing guidance. For my next installation of the Impact Pack, how can I ensure that these additional models are not downloaded automatically? Is there a configuration or adjustment I can make during the installation process to avoid this? |
I think the huggingface models are flagged because they use pickle. Pickle is generally considered a security issue as it can run code that may be malicious. If you install ultralytics through the github link, it will install 8.3.41, yes. The Github installation is fine, only the package on PyPi is compromised. |
Thank you so much for the clarification! Wow, that hacker really pulled off something nasty. It's shocking to see how far someone can go to compromise a widely used tool like this. I truly hope you and the team can protect the ecosystem and get everything back in order soon. If there’s anything I can do to help, let me know! |
Although Ultralytics is the cause of it all, I am both surprised and saddened that the largest and most important ltdrdata account in the ComfyUI community has fallen victim to such a major incident, allowing this virus to infiltrate, rather than just smaller experimental accounts. Is it possible that no one has noticed the presence of the virus yet? |
!!! Exception during processing !!! [Errno 8] Exec format error: '/tmp/ultralytics_runner' |
The compromised Ultralytics package version has been removed from PyPi, it should be safe to install Ultralytics again. |
ultralytics==8.3.41 |
Thanks, we have also discovered this issue and are preparing to submit it. This should be the latest supply chain software poisoning attack We found malicious processes in the deployed business machine modely.py `class YOLO(Model):
|
Recent ComfyUI-Manager's security scanner will detect this compromised version. |
It's really no reflection on ltrdata and nothing to do with their account. Anyone pulling the package from PyPi would be affected. |
ultralytics 8.3.42 on pypi is still compromised. DO NOT upgrade from pypi for now! |
this is huge i am announcing on LinkedIn |
ultralytics/ultralytics#18027 (comment) Unbelievable. |
I think it is better to remove 8.3.42 from pypi too |
We have removed 8.3.42 from PyPi as well now and are gonna continue investigating this, its very unusual. |
吓坏宝宝啦, 宝宝好害怕, 感谢英雄们排查出病毒, 并做出警示 |
More info can be found here: ultralytics/ultralytics#18027 |
Latest ComfyUI-Manager will pin the version to 8.3.40 for a while. |
I've downloaded ultralytics v8.3.41 last night for a school project, and i just got aware of this issue looking for a solution for a weird error i got when i tried to run a Yolov8 model, i already unistalled ultralytics using pip, theres some other thing i should manually uninstall? There's some instructions to completely remove the malware from the PC's wheres this malicious version got installed? |
@Coolhatena you should run a virus scan and empty any temp folders on your OS, Ultralytics 8.3.43 is now fully fixed. |
How can I confirm the version of my impact-pack? |
How can I check ? Not sure I use that version before. |
This issue is not related to the version of Impact Pack but rather caused by a dependency package. As a result, users who have recently installed Impact Pack are affected. For now, please update If you are affected by the malware, a removal guide will be displayed. |
It's interesting that this wasn't caught in review. I know this is volunteers working for free for the most part but it's a very simple attack that's not difficult to spot
|
@kybercore it wasn't "caught in review" because there was no review. It was hacked into the published pip version of a package, not the git source, and is was noticed within a matter of hours and addressed. |
Thank you so much for the detailed explanation. |
Ah okay, that makes a lot more sense. I was wondering why I couldn't find the code in the repo history |
8.3.46 -8.3.43 start |
@Skillnoob How come only the PyPi packages were compromised and not the code on GitHub? |
The malicious code was added during the PyPi publishing workflow, the attacker never added any malicious code to the repo, except a version bump that triggered the automatic ci and the removal of glenn jocher bein required for the ci. |
Incident Report: Potential Crypto Mining Attack via ComfyUI/Ultralytics
1. Problem Description
While using ComfyUI with the ComfyUI-Impact-Pack extension, suspicious behavior involving the Ultralytics package was detected. A malicious Python script was identified, seemingly designed to execute unauthorized cryptocurrency mining using system resources without user consent.
2. Identification of Malicious Code
The malicious code was located in the
downloads.py
file within the directory:Malicious Code Snippet
Observed Behavior
os.chmod
to make a file executable.connect.consrensys.com:8080
, a potentially malicious mining pool.Risk Assessment
This behavior strongly suggests unauthorized cryptocurrency mining, which could lead to:
3. Source of the Issue
The activity was traced to the installation of the Ultralytics package, which appears to be a modified version. This package might have been automatically installed as a dependency of the ComfyUI-Impact-Pack.
Installation Path
ultralytics
version8.3.41
.C:\Users\OTupã\AppData\Roaming\Python\Python312\site-packages\ultralytics
.Installation Trigger
The suspicious behavior was likely initiated during the execution of the
install.py
script included in the ComfyUI-Impact-Pack, which installs dependencies.4. Network Behavior Analysis
connect.consrensys.com
.8080
.Evidence:
4BHRQHF...
) is used, suggesting an active mining account or operation.5. Recommended Actions
Delete its directory:
Run antivirus and malware detection tools to ensure no persistent threats remain.
Check for outgoing connections to
connect.consrensys.com
and block them in your firewall.Submit this report to the maintainers of both ComfyUI and Ultralytics to prevent further abuse.
6. Supporting Evidence
C:\Users\OTupã\AppData\Roaming\Python\Python312\site-packages\ultralytics\utils\downloads.py
.This issue highlights the need for robust dependency auditing in open-source projects to prevent malicious modifications from compromising end users' systems.
The text was updated successfully, but these errors were encountered: