Close Menu
Ztoog
    What's Hot
    Science

    RFK Plans to Take on Big Pharma. It’s Easier Said Than Done

    Gadgets

    Lenovo Yoga Book i9 Review

    Gadgets

    A Free Tax Software From The US Government Is In The Plans For 2024

    Important Pages:
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Facebook X (Twitter) Instagram Pinterest
    Facebook X (Twitter) Instagram Pinterest
    Ztoog
    • Home
    • The Future

      How to Get Bot Lobbies in Fortnite? (2025 Guide)

      Can work-life balance tracking improve well-being?

      Any wall can be turned into a camera to see around corners

      JD Vance and President Trump’s Sons Hype Bitcoin at Las Vegas Conference

      AI may already be shrinking entry-level jobs in tech, new research suggests

    • Technology

      What does a millennial midlife crisis look like?

      Elon Musk tries to stick to spaceships

      A Replit employee details a critical security flaw in web apps created using AI-powered app builder Lovable that exposes API keys and personal info of app users (Reed Albergotti/Semafor)

      Gemini in Google Drive can now help you skip watching that painfully long Zoom meeting

      Apple iPhone exports from China to the US fall 76% as India output surges

    • Gadgets

      Watch Apple’s WWDC 2025 keynote right here

      Future-proof your career by mastering AI skills for just $20

      8 Best Vegan Meal Delivery Services and Kits (2025), Tested and Reviewed

      Google Home is getting deeper Gemini integration and a new widget

      Google Announces AI Ultra Subscription Plan With Premium Features

    • Mobile

      YouTube is testing a leaderboard to show off top live stream fans

      Deals: the Galaxy S25 series comes with a free tablet, Google Pixels heavily discounted

      Microsoft is done being subtle – this new tool screams “upgrade now”

      Wallpaper Wednesday: Android wallpapers 2025-05-28

      Google can make smart glasses accessible with Warby Parker, Gentle Monster deals

    • Science

      Some parts of Trump’s proposed budget for NASA are literally draconian

      June skygazing: A strawberry moon, the summer solstice… and Asteroid Day!

      Analysts Say Trump Trade Wars Would Harm the Entire US Energy Sector, From Oil to Solar

      Do we have free will? Quantum experiments may soon reveal the answer

      Was Planet Nine exiled from the solar system as a baby?

    • AI

      Fueling seamless AI at scale

      Rationale engineering generates a compact new tool for gene therapy | Ztoog

      The AI Hype Index: College students are hooked on ChatGPT

      Learning how to predict rare kinds of failures | Ztoog

      Anthropic’s new hybrid AI model can work on tasks autonomously for hours at a time

    • Crypto

      Bitcoin Maxi Isn’t Buying Hype Around New Crypto Holding Firms

      GameStop bought $500 million of bitcoin

      CoinW Teams Up with Superteam Europe to Conclude Solana Hackathon and Accelerate Web3 Innovation in Europe

      Ethereum Net Flows Turn Negative As Bulls Push For $3,500

      Bitcoin’s Power Compared To Nuclear Reactor By Brazilian Business Leader

    Ztoog
    Home » Thousands of servers hacked in ongoing attack targeting Ray AI framework
    Technology

    Thousands of servers hacked in ongoing attack targeting Ray AI framework

    Facebook Twitter Pinterest WhatsApp
    Thousands of servers hacked in ongoing attack targeting Ray AI framework
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp

    Getty Images

    Thousands of servers storing AI workloads and community credentials have been hacked in an ongoing attack marketing campaign targeting a reported vulnerability in Ray, a computing framework utilized by OpenAI, Uber, and Amazon.

    The assaults, which have been energetic for not less than seven months, have led to the tampering of AI fashions. They have additionally resulted in the compromise of community credentials, permitting entry to inner networks and databases and tokens for accessing accounts on platforms together with OpenAI, Hugging Face, Stripe, and Azure. Besides corrupting fashions and stealing credentials, attackers behind the marketing campaign have put in cryptocurrency miners on compromised infrastructure, which generally supplies large quantities of computing energy. Attackers have additionally put in reverse shells, that are text-based interfaces for remotely controlling servers.

    Hitting the jackpot

    “When attackers get their hands on a Ray production cluster, it is a jackpot,” researchers from Oligo, the safety agency that noticed the assaults, wrote in a publish. “Valuable company data plus remote code execution makes it easy to monetize attacks—all while remaining in the shadows, totally undetected (and, with static security tools, undetectable).”

    Among the compromised delicate info are AI manufacturing workloads, which permit the attackers to regulate or tamper with fashions throughout the coaching part and, from there, corrupt the fashions’ integrity. Vulnerable clusters expose a central dashboard to the Internet, a configuration that permits anybody who appears for it to see a historical past of all instructions entered thus far. This historical past permits an intruder to shortly find out how a mannequin works and what delicate knowledge it has entry to.

    Advertisement

    Oligo captured screenshots that uncovered delicate personal knowledge and displayed histories indicating the clusters had been actively hacked. Compromised assets included cryptographic password hashes and credentials to inner databases and to accounts on OpenAI, Stripe, and Slack.

    • Kuberay Operator operating with Administrator permissions on the Kubernetes API.

    • Password hashes accessed

    • Production database credentials

    • AI mannequin in motion: dealing with a question submitted by a person in actual time. The mannequin may very well be abused by the attacker, who might doubtlessly modify buyer requests or responses.

    • Tokens for OpenAI, Stripe, Slack, and database credentials.

    • Cluster Dashboard with Production workloads and energetic duties

    Ray is an open supply framework for scaling AI apps, which means permitting enormous numbers of them to run without delay in an environment friendly method. Typically, these apps run on enormous clusters of servers. Key to creating all of this work is a central dashboard that gives an interface for displaying and controlling operating duties and apps. One of the programming interfaces accessible by the dashboard, generally known as the Jobs API, permits customers to ship an inventory of instructions to the cluster. The instructions are issued utilizing a easy HTTP request requiring no authentication.

    Last 12 months, researchers from safety agency Bishop Fox flagged the conduct as a high-severity code-execution vulnerability tracked as CVE-2023-48022.

    A distributed execution framework

    “In the default configuration, Ray does not enforce authentication,” wrote Berenice Flores Garcia, a senior safety guide at Bishop Fox. “As a result, attackers may freely submit jobs, delete existing jobs, retrieve sensitive information, and exploit the other vulnerabilities described in this advisory.”

    Anyscale, the developer and maintainer of Ray, responded by disputing the vulnerability. Anyscale officers mentioned they’ve at all times held out Ray as framework for remotely executing code and because of this, have lengthy suggested it must be correctly segmented inside a correctly secured community.

    Advertisement

    “Due to Ray’s nature as a distributed execution framework, Ray’s security boundary is outside of the Ray cluster,” Anyscale officers wrote. “That is why we emphasize that you must prevent access to your Ray cluster from untrusted machines (e.g., the public Internet).”

    The Anyscale response mentioned the reported conduct in the roles API wasn’t a vulnerability and wouldn’t be addressed in a near-term replace. The firm went on to say it might finally introduce a change that might implement authentication in the API. It defined:

    We have thought of very significantly whether or not or not one thing like that might be a good suggestion, and thus far haven’t applied it for worry that our customers would put an excessive amount of belief right into a mechanism that may find yourself offering the facade of safety with out correctly securing their clusters in the best way they imagined.

    That mentioned, we acknowledge that affordable minds can differ on this difficulty, and consequently have determined that, whereas we nonetheless don’t consider that a corporation ought to depend on isolation controls inside Ray like authentication, there may be worth in sure contexts in furtherance of a defense-in-depth technique, and so we are going to implement this as a brand new function in a future launch.

    Critics of the Anyscale response have famous that repositories for streamlining the deployment of Ray in cloud environments bind the dashboard to 0.0.0.0, an tackle used to designate all community interfaces and to designate port forwarding on the identical tackle. One such newbie boilerplate is out there on the Anyscale web site itself. Another instance of a publicly accessible weak setup is right here.

    Critics additionally notice Anyscale’s rivalry that the reported conduct is not a vulnerability has prevented many safety instruments from flagging assaults.

    An Anyscale consultant mentioned in an electronic mail the corporate plans to publish a script that can enable customers to simply confirm whether or not their Ray cases are uncovered to the Internet or not.

    The ongoing assaults underscore the significance of correctly configuring Ray. In the hyperlinks supplied above, Oligo and Anyscale record practices which can be important to locking down clusters. Oligo additionally supplied an inventory of indicators Ray customers can use to find out if their cases have been compromised.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp

    Related Posts

    Technology

    What does a millennial midlife crisis look like?

    Technology

    Elon Musk tries to stick to spaceships

    Technology

    A Replit employee details a critical security flaw in web apps created using AI-powered app builder Lovable that exposes API keys and personal info of app users (Reed Albergotti/Semafor)

    Technology

    Gemini in Google Drive can now help you skip watching that painfully long Zoom meeting

    Technology

    Apple iPhone exports from China to the US fall 76% as India output surges

    Technology

    Today’s NYT Wordle Hints, Answer and Help for May 26, #1437

    Technology

    5 Skills Kids (and Adults) Need in an AI World – O’Reilly

    Technology

    How To Come Back After A Layoff

    Leave A Reply Cancel Reply

    Follow Us
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    Top Posts
    The Future

    Today’s NYT Strands Hints, Answer and Help for April 14 #407

    Looking for the most up-to-date Strands reply? Click right here for our every day Strands hints,…

    Technology

    Microsoft is testing a Windows 11 energy saver mode for laptops and desktops

    What simply occurred? Microsoft’s newest Windows 11 preview construct for Insiders within the Canary Channel…

    Science

    Gun deaths among US kids continue to rise; Southern states have worst rates

    Enlarge / Students from Launch Charter School collect for a rally for National Gun Violence…

    AI

    Checkmate with Scale: Google DeepMind’s Revolutionary Leap in Chess AI

    The intersection of synthetic intelligence and the traditional sport of chess has lengthy captivated researchers,…

    Crypto

    Bitcoin Indicator Predicts Bullish Trends

    Bitcoin (BTC) fanatics are protecting a detailed eye on the most recent market developments, and…

    Our Picks
    AI

    Automated system teaches users when to collaborate with an AI assistant | Ztoog

    Technology

    Jakarta-based Praktis, which provides end-to-end supply chain software for D2C brands, raised a $20M Series A led by East Ventures (Catherine Shu/Ztoog)

    Crypto

    Sam Altman’s Worldcoin eyeball-scanning crypto project launches

    Categories
    • AI (1,494)
    • Crypto (1,754)
    • Gadgets (1,806)
    • Mobile (1,852)
    • Science (1,868)
    • Technology (1,804)
    • The Future (1,650)
    Most Popular
    Gadgets

    The best cheap projectors in 2024

    Mobile

    The camera-centric Nubia Z50S Pro is now available in the US and Europe

    AI

    Neural architecture search in polynomial complexity – Ztoog

    Ztoog
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    © 2025 Ztoog.

    Type above and press Enter to search. Press Esc to cancel.