ShadowRay 2.0 Exploits Ray AI Flaw for Crypto Botnet Attack

ShadowRay 2.0: Exploiting Ray AI Framework Vulnerability to Create Self-Replicating Cryptocurrency Mining Botnets

  • A longstanding security flaw in the Ray AI framework is being exploited to create self-replicating cryptocurrency mining botnets.
  • The ShadowRay 2.0 campaign targets exposed Ray clusters with NVIDIA GPUs using unauthenticated job submissions.
  • Attackers use infected clusters for cryptojacking and denial-of-service (DDoS) attacks, enhancing their capabilities beyond mining.
  • More than 230,500 Ray servers are publicly accessible, posing widespread risk due to inadequate network isolation.
  • Mitigation includes using tools like the Anyscale “Ray Open Ports Checker” and restricting dashboard access with firewalls and authentication.

Oligo Security has issued a warning about an ongoing global attack campaign exploiting a two-year-old vulnerability in the Ray open-source Artificial Intelligence (AI) framework. The exploit allows threat actors to hijack clusters equipped with NVIDIA GPUs, turning them into a self-propagating cryptocurrency mining botnet dubbed ShadowRay 2.0. This campaign is a continuation of activity observed from September 2023 to March 2024 and has likely been active since September 2024.

- Advertisement -

The critical flaw, identified as CVE-2023-48022 with a CVSS score of 9.8, stems from missing authentication in the Ray Job Submission API at the endpoint “/api/jobs/”. Attackers submit malicious jobs containing Bash and Python payloads to exposed dashboards, gaining control over the clusters. The vulnerability remains unpatched due to a “long-standing design decision” by the developers to run Ray in isolated environments and trust submitted code, as detailed in an update by Anyscale.

Infected clusters become part of a worm capable of spreading the Malware autonomously by distributing payloads to other vulnerable Ray servers. The malware uses the platform’s orchestration abilities to move laterally to nodes not visible on the internet, maintain remote access through reverse shells, and persist by executing a cron job every 15 minutes that fetches updated malware versions from GitLab repositories.

The campaign employs GitHub and GitLab for Hosting malicious payloads under accounts like “ironern440-group” and “thisisforwork440-ops,” both of which have been removed following takedown requests. However, attackers quickly recreated accounts, signaling ongoing persistence. The malicious code shows signs of leveraging large language models (LLMs) to generate the payloads, based on its structure and comments.

The infection mechanism includes checks to exclude targets in China by deploying region-specific malware only outside that area. The malware also eliminates competing cryptocurrency miners on infected hosts to maximize resource use. Additionally, processes are disguised as legitimate Linux kernel workers, and CPU use is capped around 60% to avoid detection.

- Advertisement -

Despite recommendations for Ray to operate in controlled networks, over 230,500 Ray servers remain exposed online. These are detectable using tools such as the open-source vulnerability scanner interact.sh.

Anyscale has responded by releasing a “Ray Open Ports Checker” utility to verify cluster configurations and prevent accidental exposure. Recommended defenses include restricting network access via firewall rules and implementing authentication for the Ray Dashboard port (default TCP 8265), as outlined here.

In addition to cryptojacking, compromised clusters have been used in denial-of-service (DDoS) attacks using tools like sockstress. These attacks target competitor mining pools and other infrastructure by flooding port 3333, commonly associated with mining services, indicating diversified monetization strategies by threat actors.

“The attackers have turned Ray’s legitimate orchestration features into tools for a self-propagating, globally cryptojacking operation, spreading autonomously across exposed Ray clusters,” said researchers Avi Lumelsky and Gal Elbaz, highlighting the dangerous evolution of this campaign.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Bitcoin Holds at $92K Amid Trade Tensions, Volatility Fears.

Bitcoin stabilized near $92,000 after a liquidation-driven sell-off on Monday.Options markets show rising demand...

Trove Keeps $9.4M for Solana Pivot; Investors Demand Refunds

Trove Markets will keep about $9.4 million of an over $11.5 million raise and...

BTC retreats to $92K as $395M ETF outflows, gold soars anew.

Bitcoin fell 3.4% over the weekend as investors cut risk amid geopolitical tensions and...

Burwick Law seeks sanctions, compliance monitor for Pump Fun

Burwick Law asked a judge to stop the memecoin platform Pump Fun from Hosting...

Bermuda to launch nation-wide on-chain economy with USDC now

Bermuda plans to move much of its economy on-chain with support from Coinbase and...
- Advertisement -

Must Read

14 Ways On How to Make Money with Cryptocurrency

Many people want to make money with cryptocurrency because they have heard the success stories of people who became millionaires from zero.If you...
Bitcoin (BTC) $ 92,043.00 0.67%
Ethereum (ETH) $ 3,171.93 1.30%
XRP (XRP) $ 1.97 0.08%
Bittensor (TAO) $ 249.05 0.63%
Polkadot (DOT) $ 2.04 3.83%
Cardano (ADA) $ 0.365939 0.67%
Chainlink (LINK) $ 12.81 0.10%
Hyperliquid (HYPE) $ 23.64 1.44%
Monero (XMR) $ 609.67 0.52%
Hedera (HBAR) $ 0.110172 1.13%
Toncoin (TON) $ 1.57 2.29%