InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: ShadowRay 2.0 exploits unpatched Ray flaw to build self-spreading GPU cryptomining botnet
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > ShadowRay 2.0 exploits unpatched Ray flaw to build self-spreading GPU cryptomining botnet
Technology

ShadowRay 2.0 exploits unpatched Ray flaw to build self-spreading GPU cryptomining botnet

November 20, 2025 5 Min Read
Share
ShadowRay 2.0 exploits unpatched Ray flaw to build self-spreading GPU cryptomining botnet
SHARE

Oligo Security has warned of an ongoing attack that exploits a two-year-old security flaw in the Ray open source artificial intelligence (AI) framework to turn infected clusters powered by NVIDIA GPUs into self-replicating cryptocurrency mining botnets.

Activities called by code names Shadow Ray 2.0is the evolution of the previous wave observed between September 2023 and March 2024. The core of this attack is to exploit a critical missing authentication bug (CVE-2023-48022, CVSS score: 9.8) to take control of susceptible instances, take over their computing power, and perform illegal cryptocurrency mining using XMRig.

The vulnerability remains unpatched due to a “long-standing design decision” consistent with Ray’s development best practices, which require operations to run in isolated networks and rely on trusted code.

This campaign involves submitting malicious jobs to the unauthenticated Ray job submission API (‘/api/jobs/’) on exposed dashboards using commands ranging from simple reconnaissance to complex multi-step Bash and Python payloads. A compromised Ray cluster is then used in a spray-and-pray attack to distribute payloads to other Ray dashboards, essentially creating a worm that can infect from victim to victim.

The attack is known to utilize GitLab and GitHub to distribute the malware, creating repositories with names like “ironern440-group” and “thisisforwork440-ops” to hide the malicious payload. Both accounts are no longer accessible. However, cybercriminals have responded to takedown efforts by creating new GitHub accounts, demonstrating their tenacity and ability to quickly resume operations.

The payload then leverages the platform’s orchestration capabilities to laterally pivot to non-internet-connected nodes to spread the malware, create a reverse shell for remote control into attacker-controlled infrastructure, and establish persistence by running a cron job every 15 minutes to retrieve the latest version of the malware from GitLab to reinfect the host.

See also  India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

Researchers Avi Lumelsky and Gal Elbaz said the attackers “turned Ray’s legitimate orchestration functionality into a tool for a self-propagating global cryptojacking operation, autonomously spreading across exposed Ray clusters.”

This campaign may have used Large-Scale Language Models (LLM) to create GitLab payloads. This rating is based on the malware’s “structure, comments, and error handling patterns.”

The infection chain includes an explicit check to see if the victim is in China, and if so, they are served a region-specific version of the malware. It is also designed to eliminate competition by scanning and terminating the running processes of other crypto miners. This is a tactic widely employed by cryptojacking groups to maximize mining profits from their hosts.

Another notable aspect of this attack is that it uses various tactics to remain unnoticed, such as disguising the malicious process as a legitimate Linux kernel worker service and limiting CPU usage to approximately 60%. It is believed that this campaign may have been active since September 2024.

Although Ray is intended to be deployed within a “controlled network environment,” our findings show that users are exposing Ray servers to the Internet, opening up a lucrative attack surface for malicious attackers, and using open source vulnerability detection tool interact.sh to identify which Ray dashboard IP addresses are exploitable. Over 230,500 Ray servers are publicly accessible.

Anyscale, which originally developed Ray, has released the “Ray Open Ports Checker” tool to verify proper configuration of clusters to prevent accidental exposure. Other mitigation strategies include configuring firewall rules to limit unauthorized access and adding authentication to the Ray dashboard port (8265 by default).

See also  Chaos mesh critical graphical defects enable takeover of RCE and Fruc Bernate clusters

“The attackers deployed sockstress, a TCP state depletion tool, to target production websites. This suggests that the compromised Ray clusters are being weaponized, possibly for denial of service attacks against competing mining pools or other infrastructure,” Oligo said.

“This transforms the operation from pure cryptojacking to a multipurpose botnet. The ability to launch DDoS attacks adds another monetization vector. Attackers can rent out DDoS capacity or use it to eliminate competition. Target port 3333 is commonly used by mining pools, suggesting attacks against rival mining infrastructure.”

Share This Article
Twitter Copy Link
Previous Article Get the lowest price on Kingdom Come Deliverance 2 and get one of the top-rated RPGs of 2025 with all DLC Get the lowest price on Kingdom Come Deliverance 2 and get one of the top-rated RPGs of 2025 with all DLC
Next Article President Trump calls Democrats 'traitors' for asking military to 'refuse illegal orders' President Trump calls Democrats ‘traitors’ for asking military to ‘refuse illegal orders’

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China
Technology

The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China

4 Min Read
Smishing Triad links to 194,000 malicious domains in global phishing operation
Technology

Smishing Triad links to 194,000 malicious domains in global phishing operation

5 Min Read
Chinese APT
Technology

Chinese apt deploys egg stream fireless malware to infringe Philippine military systems

4 Min Read
North Korean hacker lures defense engineer with fake job to steal drone secrets
Technology

North Korean hacker lures defense engineer with fake job to steal drone secrets

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?