xmrig, kdevtmpfsi) or random .php scripts detected in project directories.
| Stage | Action | Purpose |
|---|---|---|
| 1. Entry | Exploit Vulnerability | Uses flaws (like Next.js RSC bug) to execute curl or wget. |
| 2. Payload | Download Miner | Server fetches xmrig and a config.json. |
| 3. Persistence | Install Backdoor | Creates Cron Jobs or web shells to ensure auto-restart. |
| 4. Execution | Start Mining | Server mines Monero, exhausting CPU resources. |
Stop the "heartbeat" of the attack and clear the re-infection loop.
# 1. Stop the CPU Drain
ps aux | grep xmrig
sudo kill -9 [PID]
# 2. Check for Persistence (The Re-infection Loop)
crontab -l
# Look for suspicious URLs/scripts. Use 'crontab -e' to purge.
Compare against git and rotate all secrets.
# Check for untracked malicious files
git status
# Update Next.js to safe versions:
# Safe: 15.x.x | 14.2.11+ | 13.5.7+
root.| File Name | Type | Threat |
|---|---|---|
xmrig / kdevtmpfsi |
Binary | Critical: Crypto Miner |
*.php / shell.py |
Script | Critical: Remote Backdoor |
.hidden_folder |
Directory | Medium: Hides Malicious Assets |