update_cpanelv2 and similar commands in script

I have seen a script (installed on the web server of a web hoster, owned by root) using some of these update commands (update_cpanelv21, update_cloudv2, update_lswsv2, ...), all with --Uninstall, followed by rm -rf of these commands and some related files, killall, and finally the script deletes itself.

Searching for these update commands on Google, I can only find very questionable sites.

What are the chances that this is a 100% legitimate way of doing things (and unrelated to what you find on Google when searching for these commands)?


  • AlbaHostAlbaHost Hosting Provider

    wWw.AlbaHost.Net .AL domains, Dedicated Servers, VPS/VDS and Hosting Services. Geo located in Albania.

  • /usr/local/cpanel/scripts/upcp is the real way to update whm/cpanel

    If anything, it's a script used by a license "crack" to clean cpane/whm licenses so they can be refreshed.

    Here is a raw pastebin of it: https://pastebin.com/raw/KKhqZDGK

  • Is it possible to capture/share the executables?

    All of my VMs: https://nodecheck.net/s/otusibrc/

  • @Otus9051 said:
    Is it possible to capture/share the executables?

    I have captured the script (it contains a slightly different version of the "csp" section in VinnyReo's pastebin).

    I don't see any of the binaries named in that script, but maybe that's because my account is containerized.

    Anyway, just found that most of these components actually have publicly available licence checks where you can check the licence status for a specific IP address. The results I am seeing from these are not consistent with what I am seeing in the web UI (e.g. licence check only shows "free", "trial" or no licence, when clearly the full version is being made available to the end user).

Sign In or Register to comment.