Skip to content
NewsMining Virus Found in ComfyUI Impact-Pack Plugin - Urgent Action Required

Mining Virus Found in ComfyUI Impact-Pack Plugin - Urgent Action Required

ComfyUI-Impact-Pack-virus

Original Issue Report: ComfyUI-Impact-Pack Issue #843

Event Overview

Impact-Pack, one of the most popular plugins in the ComfyUI community, has been found to have a serious security vulnerability. The plugin, through its dependency package Ultralytics (versions 8.3.41 and 8.3.42), contains a cryptocurrency mining virus that can utilize system resources for mining operations without user awareness.

Virus Behavior Analysis

The virus operates primarily through the following methods:

  1. Automatically downloads and executes malicious programs through the modified Ultralytics package
  2. Connects to suspicious mining pool address: connect.consrensys.com:8080
  3. Runs silently in the background, consuming significant system resources
  4. Automatically deletes execution files to evade detection

Affected Scope

  • Users who have installed the ComfyUI Impact-Pack plugin
  • Users using Ultralytics versions 8.3.41 or 8.3.42
  • Primarily affects Windows and Linux x86/AMD64 platform users

Solutions

1. Immediately Uninstall Suspicious Packages

pip uninstall ultralytics ultralytics-thop

2. Remove Impact-Pack Plugin

Delete the following directories:

..\<ComfyUI installation directory>\ComfyUI\custom_nodes\ComfyUI-Impact-Pack

3. System Security Check

  • Run antivirus software for a complete system scan
  • Check for suspicious processes in system processes
  • Check and close connections to connect.consrensys.com
  • Block this domain in your firewall

Windows System:

  1. Open Windows Defender Firewall

    • Press Win + R, type wf.msc to open Advanced Security Windows Defender Firewall
    • Or access through Control Panel -> System and Security -> Windows Defender Firewall
  2. Create New Outbound Rule

    • Click “Outbound Rules” in the left panel
    • Click “New Rule” in the right actions panel
    • Select “Custom” rule type
    • In the “Program” step, select “All Programs”
    • In “Protocol and Ports”, select “Any” protocol
    • In the “Scope” step, add remote IP address: connect.consrensys.com
    • Choose “Block the connection”
    • Name the rule (e.g. “Block Mining Domain”) and complete creation

macOS System:

  1. Using Built-in Firewall
    echo "127.0.0.1 connect.consrensys.com" | sudo tee -a /etc/hosts
  2. Using Little Snitch (Recommended)
    • Install Little Snitch
    • Create new rule
    • Add connect.consrensys.com to block list

Linux System:

  1. Using UFW (Ubuntu Firewall)

    sudo ufw deny out from any to connect.consrensys.com
    sudo ufw enable
  2. Using iptables

    sudo iptables -A OUTPUT -d connect.consrensys.com -j DROP
    sudo iptables-save > /etc/iptables/rules.v4
  3. Modify hosts file

    echo "127.0.0.1 connect.consrensys.com" | sudo tee -a /etc/hosts

The above solutions apply to Windows, macOS, and Linux systems, written by AI.

4. Reinstall Secure Version

After the official release of a secure version, you can reinstall Ultralytics using the following method:

pip install git+https://github.com/ultralytics/ultralytics.git

Preventive Measures

  1. Regularly monitor system resource usage
  2. Carefully verify sources before installing plugins
  3. Keep up to date with the latest security versions
  4. Use ComfyUI-Manager’s security scanning features

Latest Developments

  • The Ultralytics team has removed the infected versions from PyPI
  • ComfyUI-Manager has added related security detection features
  • The Impact-Pack team is investigating the incident and preparing to release security updates

Important Notes

If you notice abnormally high CPU/GPU usage in your system, it is recommended to follow the above steps immediately. It is also advised to keep an eye on official announcements from ComfyUI-Impact-Pack and wait for the release of a secure new version.

This incident also reminds us to pay extra attention to security when using open source software. Users are advised to perform necessary security checks before installing new plugins.