Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

NBA star Giannis Antetokounmpo joins Calci as an investor

New York state lawmaker proposes three-year moratorium on new data centers

This week’s science news: Anomalies inside Earth, the Artemis II leak and how psychedelics can help treat PTSD

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » ShadowRay 2.0 exploits unpatched Ray flaw to build self-spreading GPU cryptomining botnet
Identity

ShadowRay 2.0 exploits unpatched Ray flaw to build self-spreading GPU cryptomining botnet

userBy userNovember 20, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 20, 2025Ravi LakshmananVulnerabilities / Cloud Computing

Oligo Security has warned that an attack is underway that exploits a two-year-old security flaw in the Ray open source artificial intelligence (AI) framework to turn infected clusters powered by NVIDIA GPUs into self-replicating cryptocurrency mining botnets.

The activity, codenamed “ShadowRay 2.0,” is an evolution of a previous wave observed from September 2023 to March 2024. The core of this attack is to exploit a critical missing authentication bug (CVE-2023-48022, CVSS score: 9.8) to take control of susceptible instances, take over their computing power, and perform illegal cryptocurrency mining using XMRig.

The vulnerability remains unpatched due to a “long-standing design decision” consistent with Ray’s development best practices, which require operations to run in isolated networks and rely on trusted code.

DFIR retainer service

This campaign involves submitting malicious jobs to the unauthenticated Ray job submission API (‘/api/jobs/’) on exposed dashboards using commands ranging from simple reconnaissance to complex multi-step Bash and Python payloads. A compromised Ray cluster is then used in a spray-and-pray attack to distribute payloads to other Ray dashboards, essentially creating a worm that can infect from victim to victim.

The attack is known to utilize GitLab and GitHub to distribute the malware, creating repositories with names like “ironern440-group” and “thisisforwork440-ops” to hide the malicious payload. Both accounts are no longer accessible. However, cybercriminals have responded to takedown efforts by creating new GitHub accounts, demonstrating their tenacity and ability to quickly resume operations.

The payload then leverages the platform’s orchestration capabilities to laterally pivot to non-internet-connected nodes to spread the malware, create a reverse shell for remote control into attacker-controlled infrastructure, and establish persistence by running a cron job every 15 minutes to retrieve the latest version of the malware from GitLab to reinfect the host.

Researchers Avi Lumelsky and Gal Elbaz said the attackers “turned Ray’s legitimate orchestration functionality into a tool for a self-propagating global cryptojacking operation, autonomously spreading across exposed Ray clusters.”

This campaign may have used Large-Scale Language Models (LLM) to create GitLab payloads. This rating is based on the malware’s “structure, comments, and error handling patterns.”

The infection chain includes an explicit check to see if the victim is in China, and if so, they are served a region-specific version of the malware. It is also designed to eliminate competition by scanning and terminating the running processes of other crypto miners. This is a tactic widely employed by cryptojacking groups to maximize mining profits from their hosts.

Another notable aspect of this attack is that it uses various tactics to remain unnoticed, such as disguising the malicious process as a legitimate Linux kernel worker service and limiting CPU usage to approximately 60%. It is believed that this campaign may have been active since September 2024.

Although Ray is intended to be deployed within a “controlled network environment,” our findings show that users are exposing Ray servers to the Internet, opening up a lucrative attack surface for malicious attackers, and using open source vulnerability detection tool interact.sh to identify which Ray dashboard IP addresses are exploitable. Over 230,500 Ray servers are publicly accessible.

CIS build kit

Anyscale, which originally developed Ray, has released the “Ray Open Ports Checker” tool to verify proper configuration of clusters to prevent accidental exposure. Other mitigation strategies include configuring firewall rules to limit unauthorized access and adding authentication to the Ray dashboard port (8265 by default).

“The attackers deployed sockstress, a TCP state depletion tool, to target production websites. This suggests that the compromised Ray clusters are being weaponized, possibly for denial of service attacks against competing mining pools or other infrastructure,” Oligo said.

“This transforms the operation from pure cryptojacking to a multipurpose botnet. The ability to launch DDoS attacks adds another monetization vector. Attackers can rent out DDoS capacity or use it to eliminate competition. Target port 3333 is commonly used by mining pools, suggesting attacks against rival mining infrastructure.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleComet 3I/ATLAS Gallery: See images of NASA’s much-anticipated interstellar visitor
Next Article Gemini 3 refused to believe it was 2025, but an uproar ensued.
user
  • Website

Related Posts

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

February 7, 2026

The Legal Revolution is Digital: Meet TwinH, Your AI Partner in the Courtroom of the Future

February 6, 2026

China-linked DKnife AitM framework, routers targeted for traffic hijacking and malware distribution

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

NBA star Giannis Antetokounmpo joins Calci as an investor

New York state lawmaker proposes three-year moratorium on new data centers

This week’s science news: Anomalies inside Earth, the Artemis II leak and how psychedelics can help treat PTSD

Warning of signal phishing targeting German government agencies, politicians, military personnel and journalists

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.