ShadowRay 2.0 Takes Advantage of Unfixed Ray Vulnerability to Create Self-Propagating GPU Cryptomining Botnet

ShadowRay 2.0 Takes Advantage of Unfixed Ray Vulnerability to Create Self-Propagating GPU Cryptomining Botnet

Ongoing Threat: ShadowRay 2.0 Exploits Critical AI Framework Vulnerability

Recent alerts from Oligo Security warn IT professionals about ShadowRay 2.0, a cyberattack targeting a critical vulnerability in the Ray open-source AI framework. This exploit transforms infected NVIDIA GPU clusters into a self-replicating cryptocurrency mining botnet.

Key Details

  • Who: Oligo Security
  • What: Ongoing attacks exploiting CVE-2023-48022, a critical authentication bug with a CVSS score of 9.8.
  • When: Active since September 2024, with previous iterations noted between September 2023 and March 2024.
  • Where: Affecting publicly accessible Ray clusters worldwide.
  • Why: Attackers exploit the vulnerability to take control of computing resources, using them for illicit mining and potential DDoS attacks against competing infrastructures.
  • How: The attack utilizes an unauthenticated Ray Job Submission API, allowing malicious jobs to propagate autonomously across exposed clusters.

Why It Matters

The implications of this threat are vast:

  • AI Model Deployment: Organizations using AI frameworks like Ray must reassess their security posture.
  • Virtualization Strategy: Increased risks may require a revisiting of strategies to isolate and secure clusters.
  • Hybrid Cloud Adoption: With over 230,500 Ray servers publicly accessible, exposed services could undermine multi-cloud efforts.
  • Enterprise Security: The attacks underline the necessity for robust safeguards against unauthorized access.
  • Server Automation: Automation processes could become vectors for rapid malware dissemination.

Takeaway for IT Teams

IT professionals should prioritize securing their Ray deployments by implementing strict firewall rules and validating configurations with the Ray Open Ports Checker. Continuous monitoring and swiftly addressing vulnerabilities can help mitigate risks as threat actors adapt their tactics.

For more curated news and infrastructure insights, visit TrendInfra.com.

Meena Kande

meenakande

Hey there! I’m a proud mom to a wonderful son, a coffee enthusiast ☕, and a cheerful techie who loves turning complex ideas into practical solutions. With 14 years in IT infrastructure, I specialize in VMware, Veeam, Cohesity, NetApp, VAST Data, Dell EMC, Linux, and Windows. I’m also passionate about automation using Ansible, Bash, and PowerShell. At Trendinfra, I write about the infrastructure behind AI — exploring what it really takes to support modern AI use cases. I believe in keeping things simple, useful, and just a little fun along the way

Leave a Reply

Your email address will not be published. Required fields are marked *