Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

Posted on November 20, 2025November 20, 2025 By CWS

Nov 20, 2025Ravie LakshmananVulnerability / Cloud Computing
Oligo Safety has warned of ongoing assaults exploiting a two-year-old safety flaw within the Ray open-source synthetic intelligence (AI) framework to show contaminated clusters with NVIDIA GPUs right into a self-replicating cryptocurrency mining botnet.
The exercise, codenamed ShadowRay 2.0, is an evolution of a previous wave that was noticed between September 2023 and March 2024. The assault, at its core, exploits a vital lacking authentication bug (CVE-2023-48022, CVSS rating: 9.8) to take management of prone cases and hijack their computing energy for illicit cryptocurrency mining utilizing XMRig.
The vulnerability has remained unpatched as a result of a “long-standing design resolution” that is according to Ray’s improvement greatest practices, which requires it to be run in an remoted community and act upon trusted code.

The marketing campaign entails submitting malicious jobs, with instructions starting from easy reconnaissance to complicated multi-stage Bash and Python payloads, to an unauthenticated Ray Job Submission API (“/api/jobs/”) on uncovered dashboards. The compromised Ray clusters are then utilized in spray and pray assaults to distribute the payloads to different Ray dashboards, making a worm that may basically unfold from one sufferer to a different.
The assaults have been discovered to leverage GitLab and GitHub to ship the malware, utilizing names like “ironern440-group” and “thisisforwork440-ops” to create repositories and stash the malicious payloads. Each accounts are now not accessible. Nonetheless, the cybercriminals have responded to takedown efforts by creating a brand new GitHub account, illustrating their tenacity and talent to rapidly resume operations.
The payloads, in flip, leverage the platform’s orchestration capabilities to pivot laterally to non-internet-facing nodes, unfold the malware, create reverse shells to attacker-controlled infrastructure for distant management, and set up persistence by working a cron job each quarter-hour that pulls the newest model of the malware from GitLab to re-infect the hosts.
The risk actors “have turned Ray’s reliable orchestration options into instruments for a self-propagating, globally cryptojacking operation, spreading autonomously throughout uncovered Ray clusters,” researchers Avi Lumelsky and Gal Elbaz stated.
The marketing campaign has possible made use of huge language fashions (LLMs) to create the GitLab payloads. This evaluation relies on the malware’s “construction, feedback, and error dealing with patterns.”

The an infection chain entails an specific examine to find out if the sufferer is situated in China, and if that’s the case, serves a region-specific model of the malware. It is also designed to get rid of competitors by scanning working processes for different cryptocurrency miners and terminating them – a tactic extensively adopted by cryptojacking teams to maximise the mining beneficial properties from the host.
One other notable facet of the assaults is the usage of numerous techniques to fly below the radar, together with disguising malicious processes as reliable Linux kernel employee providers and limiting CPU utilization to round 60%. It is believed that the marketing campaign might have been energetic since September 2024.
Whereas Ray is supposed to be deployed inside a “managed community surroundings,” the findings present that customers are exposing Ray servers to the web, opening a profitable assault floor for unhealthy actors and figuring out which Ray dashboard IP addresses are exploitable utilizing the open-source vulnerability detection software work together.sh. Greater than 230,500 Ray servers are publicly accessible.

Anyscale, which initially developed Ray, has launched a “Ray Open Ports Checker” software to validate the correct configuration of clusters to forestall unintended publicity. Different mitigation methods embrace configuring firewall guidelines to restrict unauthorized entry and including authorization on high of the Ray Dashboard port (8265 by default).
“Attackers deployed sockstress, a TCP state exhaustion software, concentrating on manufacturing web sites. This implies the compromised Ray clusters are being weaponized for denial-of-service assaults, probably towards competing mining swimming pools or different infrastructure,” Oligo stated.
“This transforms the operation from pure cryptojacking right into a multi-purpose botnet. The flexibility to launch DDoS assaults provides one other monetization vector – attackers can hire out DDoS capability or use it to get rid of competitors. The goal port 3333 is often utilized by mining swimming pools, suggesting assaults towards rival mining infrastructure.”

The Hacker News Tags:Botnet, Build, Cryptomining, Exploits, Flaw, GPU, Ray, SelfSpreading, ShadowRay, Unpatched

Post navigation

Previous Post: Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows

Related Posts

AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals The Hacker News
What Security Leaders Need to Know About AI Governance for SaaS The Hacker News
UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns The Hacker News
Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks The Hacker News
GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module The Hacker News
Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
  • Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
  • Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image
  • New Sturnus Banking Trojan Targets WhatsApp, Telegram, Signal Messages
  • Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
  • Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
  • Critical Windows Graphics Vulnerability Lets Hackers Seize Control with a Single Image
  • New Sturnus Banking Trojan Targets WhatsApp, Telegram, Signal Messages
  • Tsundere Botnet Abusing Popular Node.js and Cryptocurrency Packages to Attack Windows, Linux, and macOS Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News