Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Cryptomining Botnet Targets Over 1,000 ComfyUI Instances

Cryptomining Botnet Targets Over 1,000 ComfyUI Instances

Posted on April 7, 2026 By CWS

An aggressive campaign has been identified aiming at internet-exposed platforms running ComfyUI, a notable stable diffusion tool, to conscript them into a cryptomining and proxy botnet. This activity is primarily orchestrated using a specifically designed Python scanner that scans major cloud IP ranges for susceptible targets. Once identified, malicious nodes are deployed through ComfyUI-Manager if no existing vulnerable node is present, according to a report by Censys security researcher Mark Ellzey.

Mechanics of the Cryptomining Operation

The campaign systematically identifies and exploits misconfigured ComfyUI instances that permit remote code execution without authentication. Once compromised, the hosts become part of a cryptomining network mining Monero via XMRig and Conflux using lolMiner. These operations are centrally administered via a Flask-based command-and-control dashboard. Despite the relatively small number of over 1,000 publicly accessible ComfyUI instances, the attacker leverages these for financial gain through opportunistic campaigns.

Tools and Exploitation Techniques

Censys uncovered the campaign after finding an open directory linked to the Aeza Group, known for bulletproof hosting services. This directory housed tools used for reconnaissance and exploitation, including scripts to locate and exploit ComfyUI instances. The scripts exploit ComfyUI’s custom nodes that execute raw Python code without authentication, allowing attackers to deliver malicious payloads efficiently.

Persistence and Competitive Targeting

To maintain persistence, the attackers deploy mechanisms that download a shell script every six hours and re-execute exploits upon ComfyUI startup. The script disables shell history, eliminates competing miners, and uses the LD_PRELOAD hook to conceal a watchdog process. Additionally, the malware protects its binaries with the ‘chattr +i’ command to prevent their deletion or modification. Notably, the campaign targets a rival botnet, ‘Hisana’, by redirecting its mining output to the attacker’s wallet and occupying its command port.

Further analysis revealed an SSH attempt to another IP associated with a worm campaign on vulnerable Redis servers, indicating a broader attack strategy. Despite initial appearances of unsophistication, the campaign’s tactics suggest a deliberate approach to exploit exposed services for persistent and monetizable infections.

Broader Context of Botnet Campaigns

The discovery aligns with other botnet campaigns exploiting various vulnerabilities across platforms like n8n, Tenda routers, and Apache ActiveMQ to install malware for cryptomining and DDoS attacks. Researchers have observed a significant increase in botnet activity, partly due to the availability of source code for botnets like Mirai, facilitating widespread attacks.

As botnet campaigns continue to proliferate, the cybersecurity landscape faces ongoing challenges in protecting exposed services from exploitation. Continuous monitoring and updating of security protocols remain essential in mitigating such threats.

The Hacker News Tags:Aeza Group, Botnet, Censys, ComfyUI, Cryptomining, Cybersecurity, Hysteria V2, lolMiner, Malware, network security, XMRig

Post navigation

Previous Post: GPUBreach Attack Threatens System Security with Root Access
Next Post: Grafana Vulnerability Risks Data Exposure via AI Features

Related Posts

U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware The Hacker News
Oracle Resolves Critical RCE Vulnerability in Identity Manager Oracle Resolves Critical RCE Vulnerability in Identity Manager The Hacker News
Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS The Hacker News
Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems The Hacker News
Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex Cisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex The Hacker News
CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Cyberattacks Demand New Defense Strategies
  • Android Zero-Interaction Bug Sparks Urgent Security Patch
  • Flowise Vulnerability Exploited by Hackers
  • Critical Docker Vulnerability Allows Host Access
  • Malware Campaign Uses Fake Software to Deploy RATs and Miners

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Cyberattacks Demand New Defense Strategies
  • Android Zero-Interaction Bug Sparks Urgent Security Patch
  • Flowise Vulnerability Exploited by Hackers
  • Critical Docker Vulnerability Allows Host Access
  • Malware Campaign Uses Fake Software to Deploy RATs and Miners

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark