BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

ShadowRay 2.0 Exploits Ray AI Flaw for Crypto Botnet Attack

ShadowRay 2.0: Exploiting Ray AI Framework Vulnerability to Create Self-Replicating Cryptocurrency Mining Botnets

  • A longstanding security flaw in the Ray AI framework is being exploited to create self-replicating cryptocurrency mining botnets.
  • The ShadowRay 2.0 campaign targets exposed Ray clusters with NVIDIA GPUs using unauthenticated job submissions.
  • Attackers use infected clusters for cryptojacking and denial-of-service (DDoS) attacks, enhancing their capabilities beyond mining.
  • More than 230,500 Ray servers are publicly accessible, posing widespread risk due to inadequate network isolation.
  • Mitigation includes using tools like the Anyscale “Ray Open Ports Checker” and restricting dashboard access with firewalls and authentication.

Oligo Security has issued a warning about an ongoing global attack campaign exploiting a two-year-old vulnerability in the Ray open-source Artificial Intelligence (AI) framework. The exploit allows threat actors to hijack clusters equipped with NVIDIA GPUs, turning them into a self-propagating cryptocurrency mining botnet dubbed ShadowRay 2.0. This campaign is a continuation of activity observed from September 2023 to March 2024 and has likely been active since September 2024.

- Advertisement -

The critical flaw, identified as CVE-2023-48022 with a CVSS score of 9.8, stems from missing authentication in the Ray Job Submission API at the endpoint “/api/jobs/”. Attackers submit malicious jobs containing Bash and Python payloads to exposed dashboards, gaining control over the clusters. The vulnerability remains unpatched due to a “long-standing design decision” by the developers to run Ray in isolated environments and trust submitted code, as detailed in an update by Anyscale.

Infected clusters become part of a worm capable of spreading the Malware autonomously by distributing payloads to other vulnerable Ray servers. The malware uses the platform’s orchestration abilities to move laterally to nodes not visible on the internet, maintain remote access through reverse shells, and persist by executing a cron job every 15 minutes that fetches updated malware versions from GitLab repositories.

The campaign employs GitHub and GitLab for Hosting malicious payloads under accounts like “ironern440-group” and “thisisforwork440-ops,” both of which have been removed following takedown requests. However, attackers quickly recreated accounts, signaling ongoing persistence. The malicious code shows signs of leveraging large language models (LLMs) to generate the payloads, based on its structure and comments.

The infection mechanism includes checks to exclude targets in China by deploying region-specific malware only outside that area. The malware also eliminates competing cryptocurrency miners on infected hosts to maximize resource use. Additionally, processes are disguised as legitimate Linux kernel workers, and CPU use is capped around 60% to avoid detection.

- Advertisement -

Despite recommendations for Ray to operate in controlled networks, over 230,500 Ray servers remain exposed online. These are detectable using tools such as the open-source vulnerability scanner interact.sh.

Anyscale has responded by releasing a “Ray Open Ports Checker” utility to verify cluster configurations and prevent accidental exposure. Recommended defenses include restricting network access via firewall rules and implementing authentication for the Ray Dashboard port (default TCP 8265), as outlined here.

In addition to cryptojacking, compromised clusters have been used in denial-of-service (DDoS) attacks using tools like sockstress. These attacks target competitor mining pools and other infrastructure by flooding port 3333, commonly associated with mining services, indicating diversified monetization strategies by threat actors.

“The attackers have turned Ray’s legitimate orchestration features into tools for a self-propagating, globally cryptojacking operation, spreading autonomously across exposed Ray clusters,” said researchers Avi Lumelsky and Gal Elbaz, highlighting the dangerous evolution of this campaign.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Trump Crypto Project Rated Among Industry’s Riskiest

The newly launched ratings firm CORE3 has assigned a 'DDD' risk grade to the...

U.S. Crypto Clarity Act Nears Key Senate Deal

Coinbase Chief Legal Officer Paul Grewal announced lawmakers are nearing a resolution on disputed...

Ex-FTX engineer Nishad Singh fined $3.7 million

Former FTX head of engineering Nishad Singh settled a Commodity Futures Trading Commission (CFTC)...

Tether’s Jesse Spiro to Chair $100M Crypto Super PAC

Tether's Head of Government Affairs, Jesse Spiro, will chair the crypto-funded Fellowship PAC ahead...

CERT-UA Impersonated, New RAT Attack Hits Ukraine

The Computer Emergency Response Team of Ukraine (CERT-UA) was impersonated in a phishing campaign...

Must Read

9 Best Books On Ethereum And Blockchain Technology

QUICK LINKSHow to Choose Your First Blockchain Book: A Simple Framework1. Define Your Goal: Are you looking to Build, Invest, or Understand?2. Assess Your...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading