Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploit ComfyUI 700+ AI Image Generation Servers to Deploy Malware

Posted on June 20, 2025June 21, 2025 By CWS

A complicated malware marketing campaign focusing on ComfyUI, a well-liked AI picture technology framework, has efficiently compromised no less than 695 servers worldwide, safety researchers have found.

The assault represents a major escalation in threats towards AI infrastructure, exploiting vulnerabilities in ComfyUI to deploy a light-weight however extremely persistent backdoor dubbed “Pickai.”

The marketing campaign first emerged in February 2025 when an early model of the malware was uploaded to VirusTotal from Hong Kong, however the full scope of the operation grew to become obvious in March when suspicious exercise was detected throughout a number of geographic areas.

The attackers have demonstrated exceptional persistence and class, using compromised infrastructure together with the official web site of Rubick.ai, a industrial AI platform serving over 200 main retail manufacturers together with Amazon, Myntra, and Hudson Bay.

XLab analysts recognized the malware by way of their Cyber Menace Perception and Evaluation System on March 17, 2025, once they flagged suspicious habits from IP deal with 185.189.149.151.

The researchers found that attackers have been leveraging ComfyUI vulnerabilities to distribute ELF executables disguised as configuration information, together with config.json, tmux.conf, and vim.json.

The malware’s title “Pickai” displays its core performance of stealing delicate AI-related knowledge, working as a digital pickpocket inside AI growth environments.

The worldwide impression of this marketing campaign extends far past particular person server compromises, with contaminated methods concentrated primarily in Germany, america, and China.

Safety researchers obtained partial visibility into the botnet by registering an unclaimed command-and-control area, revealing visitors spikes exceeding 400 day by day energetic installations during times when major C2 servers failed.

Superior Persistence Mechanisms Guarantee Lengthy-Time period Compromise

The Pickai malware employs an unusually strong persistence technique that units it aside from typical backdoors.

When working with root privileges, the malware creates 5 separate copies of itself throughout totally different system directories, every with synchronized modification timestamps matching /bin/sh to mix with legit system information.

These copies are strategically positioned in areas resembling /usr/bin/auditlogd, /usr/sbin/hwstats, /sbin/dmesglog, /var/lib/autoupd, and /var/run/healthmon, masquerading as legit system providers.

Community Communication (Supply – XLab)

Every copy implements twin persistence mechanisms utilizing each init.d and system service frameworks, creating a complete of ten totally different providers for root-level infections.

The malware intentionally appends random knowledge to every file copy, making certain that hash-based detection methods encounter totally different MD5 signatures for what is basically the identical malicious payload.

For non-root customers, Pickai maintains 5 persistence factors utilizing systemd providers in user-space directories, demonstrating its adaptability throughout totally different privilege ranges.

This redundant method signifies that incomplete removing makes an attempt will set off computerized reinfection, making the malware notably difficult to eradicate from compromised methods.

Are you from SOC/DFIR Groups! – Work together with malware within the sandbox and discover associated IOCs. – Request 14-day free trial

Cyber Security News Tags:ComfyUI, Deploy, Exploit, Generation, Hackers, Image, Malware, Servers

Post navigation

Previous Post: Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider
Next Post: Threat Actors Poisoning Google Search Results to Display The Scammer’s Phone Number Instead of Real Number

Related Posts

Android Security Update – Patch for Vulnerabilities that Allows Privilege Escalation Cyber Security News
Adversarial Machine Learning – Securing AI Models Cyber Security News
A New Tool that Automates GitHub Device Code Phishing Attack Cyber Security News
Securing Virtualized Environments – Hypervisor Security Best Practices Cyber Security News
Firefox 141 Released With Fix for Multiple Vulnerabilities Cyber Security News
Threat Actors Compromise 270+ Legitimate Websites With Malicious JavaScript Using JSFireTruck Obfuscation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Secure Your GitHub Repositories
  • CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild
  • Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code
  • New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries
  • Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Secure Your GitHub Repositories
  • CISA Added WinRaR Zero-Day (CVE-2025-8088) Vulnerability That is Actively Exploited In the Wild
  • Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code
  • New ‘Curly COMrades’ APT Hackers Attacking Targeting Critical Organizations in Countries
  • Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News