Connect with us

Security

ShadowRay’s Cryptocurrency Takeover: Converting Ray Clusters into Mining Machines

Published

on

ShadowRay 2.0: A Global Campaign Exploiting Ray Clusters for Crypto Mining

In a new global campaign known as ShadowRay 2.0, cybercriminals are targeting exposed Ray Clusters to convert them into a self-propagating cryptomining botnet. This malicious activity is facilitated by exploiting an old code execution flaw within the Ray open-source framework developed by Anyscale. Ray clusters, also referred to as head nodes, are used to build and scale AI and Python applications in a distributed computing ecosystem.

According to researchers at runtime security company Oligo, a threat actor named IronErn440 is utilizing AI-generated payloads to compromise vulnerable Ray infrastructure accessible through the public internet. This campaign follows a previous ShadowRay campaign exposed by Oligo between September 2023 and March 2024.

Exploiting Vulnerabilities and Payload Capabilities

The cybercriminals behind ShadowRay 2.0 are leveraging an old critical vulnerability identified as CVE-2023-48022 to infiltrate Ray clusters. Despite the security issue not being addressed, the number of vulnerable Ray servers accessible on the internet has significantly increased.

Oligo researchers have observed two attack waves, one utilizing GitLab for payload delivery and another targeting GitHub. The payloads used in these attacks are generated with the assistance of large language models, as evidenced by the code structure and error handling patterns.

The malicious payloads submitted through Ray’s Jobs API execute multi-stage Bash and Python scripts, orchestrating the deployment of malware across all nodes in the cluster. The crypto-mining module, which mines for Monero, is AI-generated and designed to evade detection by utilizing only a portion of the available processing power.

Defense Strategies and Recommendations

Given the absence of a fix for CVE-2023-48022, Ray users are advised to follow best practices recommended by Anyscale when deploying their clusters. These practices include securing the clusters from unauthorized access using firewall rules and security group policies.

See also  Get Rich Quick: Cryptocurrency Investment Opportunity with Fake GrubHub Emails

Anyscale has also emphasized the importance of deploying Ray in a secure, trusted environment. Additional security measures such as implementing authorization on the Ray Dashboard port and continuous monitoring of AI clusters for anomalous activity are recommended by Oligo to defend against ShadowRay 2.0.

Looking to enhance your team’s security protocols? Download our cheat sheet for expert tips on secrets management.

Trending