Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Two-Year-Old Ray AI Framework Flaw Exploited in Ongoing Campaign

Posted on November 19, 2025November 19, 2025 By CWS

Menace actors are exploiting a two-year-old vulnerability within the Ray AI framework in a contemporary marketing campaign that hit quite a few clusters, Oligo experiences.

Maintained by Anyscale, Ray is an open supply framework for scaling Python-based AI and ML purposes. Ray clusters will be deployed into the cloud to scale workloads, and must be secured and remoted in secure community environments, because the framework doesn’t implement authentication.

The difficulty, tracked as CVE-2023-48022 (CVSS rating of 9.8), permits distant, unauthenticated attackers to execute arbitrary code by way of the framework’s Jobs API.

Anyscale disputed the bug, stating that Ray’s documentation clearly states that clusters shouldn’t be used outdoors managed community environments, however stated final 12 months it might implement login and authentication mechanisms in a future launch.

Nevertheless, it wasn’t till Oligo found that a whole bunch of Ray clusters had been compromised in a data-theft marketing campaign dubbed ShadowRay that the maintainers revisited their stance on authentication.

Now, two years after CVE-2023-48022 was publicly disclosed and a 12 months and a half after the ShadowRay marketing campaign was found, a number of risk actors are exploiting Ray’s lack of authentication to abuse internet-accessible clusters, Oligo experiences.

As a part of the contemporary marketing campaign, dubbed ShadowRay 2.0, a number of risk actors have been abusing the flaw to take over computing assets as a part of crypto-mining operations.

One adversary, named IronErn440, has been utilizing Ray’s legit orchestration options to autonomously propagate their cryptojacking exercise, Oligo says.Commercial. Scroll to proceed studying.

To evade detection, the attackers had been seen limiting CPU utilization, masquerading their instruments as legit processes, and hiding GPU utilization from monitoring instruments. They’ve additionally deployed malware and abused legit code-sharing platforms for payload supply.

The marketing campaign, Oligo says, has been lively since September 2024, constructing “a multi-purpose botnet able to DDoS assaults, information exfiltration, and international autonomous propagation”.

In early November, the risk actors had been abusing GitLab for payload staging, however migrated to GitHub after the preliminary repository was eliminated, and had been seen instantly creating a brand new repository after the second was eliminated.

As a part of the GitLab-launched assaults, the risk actor used out-of-band platforms to routinely determine weak targets, after which submitted malicious jobs to carry out reconnaissance and execute Bash and Python payloads created utilizing AI.

They moved laterally to all nodes within the cluster utilizing Ray’s legit orchestration options, and deployed a multi-stage Python payload designed to determine cluster assets, calculate optimum allocation, and submit a takeover job utilizing these useful resource necessities.

“The payloads from GitLab are prone to be AI-generated, based mostly on its construction, feedback, and error dealing with patterns. Attackers are actually utilizing AI to generate assault code concentrating on AI infrastructure,” Oligo notes.

The safety agency additionally noticed the deployment of a number of interactive reverse shells to AWS-hosted command-and-control (C&C) servers. The abundance of shells suggests both a complicated failover mechanism, or that a number of attackers might be concentrating on Ray clusters and competing for the assets.

The marketing campaign particularly focused clusters with NVIDIA GPUs for cryptojacking, and deployed a number of persistence instruments and scripts to determine and terminate rival crypto-miners operating on the compromised clusters.

Primarily based on lively commits within the IronErn440’s GitLab repository, Oligo believes that the risk actor was updating the payloads in actual time. The updates would propagate throughout the community inside hours.

“That is DevOps for cybercrime. Attackers used GitLab as their CI/CD pipeline for malware distribution. They will A/B take a look at strategies, roll again failed updates, and reply to defensive measures – all by way of model management. The commit historical past confirmed lively growth in actual time,” Oligo notes.

Moreover, the attackers abused the compromised clusters to steal credentials, offering them with root entry to MySQL databases deployed in manufacturing. Tokens and cloud credentials had been additionally discovered on the compromised workloads, in addition to proprietary, customized fashions on some cases.

The risk actor additionally deployed a TCP state exhaustion instrument referred to as Sockstress, which suggests they might be weaponizing the Ray clusters for distributed denial-of-service (DDoS) assaults.

“Compromised Ray clusters had been used to spray assault payloads to different Ray dashboards worldwide. The attackers primarily created a self-propagating worm that makes use of one sufferer to scan for and compromise the following sufferer,” Oligo notes.

After shifting their infrastructure to GitHub, the attackers had been seen compromising clusters with 1000’s of nodes and totally using their CPUs for crypto-mining and updating their instruments.

One of many compromised servers contained 240 gigabytes of supply code, AI fashions, and datasheets, Oligo says.

The safety agency’s scans uncovered greater than 230,000 Ray servers accessible from the online. Many servers belonging to startups, analysis organizations, and AI environments have been compromised on this marketing campaign.

Associated: AI Is Supercharging Phishing: Right here’s Find out how to Struggle Again

Associated: Anthropic Says Claude AI Powered 90% of Chinese language Espionage Marketing campaign

Associated: Many Forbes AI 50 Corporations Leak Secrets and techniques on GitHub

Associated: Observe Pragmatic Interventions to Hold Agentic AI in Verify

Security Week News Tags:Campaign, Exploited, Flaw, Framework, Ongoing, Ray, TwoYearOld

Post navigation

Previous Post: New Nova Stealer Attacking macOS Users by Swapping Legitimate Apps to Steal Cryptocurrency Wallet Data
Next Post: Destructive Akira Ransomware Attack with a Single Click on CAPTCHA in Malicious Website

Related Posts

Microsoft Says Chinese APTs Exploited ToolShell Zero-Days Weeks Before Patch Security Week News
Flaw Allowing Website Takeover Found in WordPress Plugin With 400k Installations Security Week News
Government, Industrial Servers Targeted in China-Linked ‘PassiveNeuron’ Campaign Security Week News
Rethinking Success in Security: Why Climbing the Corporate Ladder Isn’t Always the Goal Security Week News
MATLAB Maker MathWorks Recovering From Ransomware Attack Security Week News
iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files
  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ollama Vulnerabilities Let Attackers Execute Arbitrary Code by Parsing of Malicious Model Files
  • Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
  • SolarWinds Patches Three Critical Serv-U Vulnerabilities
  • China-Nexus APT Group Leverages DLL Sideloading Technique to Attack Government and Media Sectors
  • Hackers Can Exploit Default ServiceNow AI Assistants Configurations to Launch Prompt Injection Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News