• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 56000 (56k) monthly views (unique) and 285135 clicks per month, as per Google Analytics! Thank you for your support! 🎉

New ShadowRay Attacks Hack Ray Clusters and Turn Them Into Crypto-Mining Machines

johny899

New Member
Content Writer
Messages
859
Reaction score
3
Points
23
Balance
$1,053.6USD
I’d like to bring your attention to a new cyber security issue I’ve learned about. This one is called ShadowRay and is able to commandeer Ray clusters to then mine cryptocurrency. Seems intense, right? If you use Ray for AI or high workloads, you should be aware of it.

What’s Going On?​

Hackers have successfully exploited a vulnerability in Ray. They exploit this vulnerable to access servers that are publicly exposed on the internet. After breaching the server, they will then get the server to run crypto-mining software to earn money for themselves.

In reality, here are the basics:

• They are employing a bug with the name CVE-2023-48022.
• This bug allows them to run any job on a Ray cluster with no password.
• Over 230,000 Ray Servers are publicly exposed and exploitable.
• Their primary goal is to run a Monero crypto miner (XMRig).
• They steal data, capture passwords, and may also utilize the server for DDoS.

All of this is running silently, meaning you likely wouldn’t even know it’s going on.

How the Attack Works;​

Step 1: Getting Access

The hacker interacts with the Jobs API in Ray. Since it has no login, and no restrictions in place, the hacker simply submits a command to the Jobs API and Ray executes the command.

Step 2: Actions Taken by Hacker Once Inside

Once they gain access to your server, they take the following actions:
  • Check your CPU and GPU capabilities.
  • If you have a strong server (8 cores or more), they will begin mining from it.
  • They will only use 60% of the CPU so you do not get suspicious.
  • They will install cron jobs and system files as a stayer in your system.
  • They will block other miners so that only their miner runs.
They will also do these activities:
  • Steal data from your machine.
  • Open a door to your server so they can come back at will.
  • Use your server to conduct DDoS attacks.
  • Use AI written code to avoid making errors, provide anonymity, and hide better.

Why is This Important​

If you run Ray clusters this should concern you. A lot of people think Ray only runs in trusted networks, when in fact many of these servers are open to the public internet. That is what hackers take advantage of.

What Happens When You’re Attacked?​

  • Your server gets really slow.
  • Your cloud bill gets even bigger.
  • Your data can be stolen.
  • A hacker could use your computer to attack someone else.

What You Should Do​

Here’s what you do to protect yourself:
  • Stop public access to Ray (use firewalls).
  • Implement a login/password for the Ray Dashboard and Jobs API.
  • Keep an eye on your CPU for unusually high usage.
  • Look for cron jobs, or unknown processes.
Please take this bug seriously. If you cannot fix it right now, at a minimum, isolate the server so that hackers cannot easily reach it.
 
Last edited:
Top