Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploit ComfyUI 700+ AI Image Generation Servers to Deploy Malware

Posted on June 20, 2025June 21, 2025 By CWS

A complicated malware marketing campaign focusing on ComfyUI, a well-liked AI picture technology framework, has efficiently compromised no less than 695 servers worldwide, safety researchers have found.

The assault represents a major escalation in threats towards AI infrastructure, exploiting vulnerabilities in ComfyUI to deploy a light-weight however extremely persistent backdoor dubbed “Pickai.”

The marketing campaign first emerged in February 2025 when an early model of the malware was uploaded to VirusTotal from Hong Kong, however the full scope of the operation grew to become obvious in March when suspicious exercise was detected throughout a number of geographic areas.

The attackers have demonstrated exceptional persistence and class, using compromised infrastructure together with the official web site of Rubick.ai, a industrial AI platform serving over 200 main retail manufacturers together with Amazon, Myntra, and Hudson Bay.

XLab analysts recognized the malware by way of their Cyber Menace Perception and Evaluation System on March 17, 2025, once they flagged suspicious habits from IP deal with 185.189.149.151.

The researchers found that attackers have been leveraging ComfyUI vulnerabilities to distribute ELF executables disguised as configuration information, together with config.json, tmux.conf, and vim.json.

The malware’s title “Pickai” displays its core performance of stealing delicate AI-related knowledge, working as a digital pickpocket inside AI growth environments.

The worldwide impression of this marketing campaign extends far past particular person server compromises, with contaminated methods concentrated primarily in Germany, america, and China.

Safety researchers obtained partial visibility into the botnet by registering an unclaimed command-and-control area, revealing visitors spikes exceeding 400 day by day energetic installations during times when major C2 servers failed.

Superior Persistence Mechanisms Guarantee Lengthy-Time period Compromise

The Pickai malware employs an unusually strong persistence technique that units it aside from typical backdoors.

When working with root privileges, the malware creates 5 separate copies of itself throughout totally different system directories, every with synchronized modification timestamps matching /bin/sh to mix with legit system information.

These copies are strategically positioned in areas resembling /usr/bin/auditlogd, /usr/sbin/hwstats, /sbin/dmesglog, /var/lib/autoupd, and /var/run/healthmon, masquerading as legit system providers.

Community Communication (Supply – XLab)

Every copy implements twin persistence mechanisms utilizing each init.d and system service frameworks, creating a complete of ten totally different providers for root-level infections.

The malware intentionally appends random knowledge to every file copy, making certain that hash-based detection methods encounter totally different MD5 signatures for what is basically the identical malicious payload.

For non-root customers, Pickai maintains 5 persistence factors utilizing systemd providers in user-space directories, demonstrating its adaptability throughout totally different privilege ranges.

This redundant method signifies that incomplete removing makes an attempt will set off computerized reinfection, making the malware notably difficult to eradicate from compromised methods.

Are you from SOC/DFIR Groups! – Work together with malware within the sandbox and discover associated IOCs. – Request 14-day free trial

Cyber Security News Tags:ComfyUI, Deploy, Exploit, Generation, Hackers, Image, Malware, Servers

Post navigation

Previous Post: Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider
Next Post: Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number

Related Posts

KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique Cyber Security News
AI Red Teaming Tool “Red AI Range” Discovers, Analyze, and Mitigate  Vulnerabilities Cyber Security News
VMware Tools and Aria 0-Day Vulnerability Exploited for Privilege Escalation and Code Execution Cyber Security News
New PerfektBlue Attack Exposes Millions of Cars to Remote Hacking Cyber Security News
Microsoft Details Defence Techniques Against Indirect Prompt Injection Attacks Cyber Security News
Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark