Close Menu
Ztoog
    What's Hot
    Gadgets

    MediaTek Announced Dimensity 9300 SoC With All-Big-Core CPU And Boosted AI Performance

    Mobile

    Google Messages may soon support emergency SOS messages via satellite

    Science

    NASA cut $420 million for climate science, moon modelling and more

    Important Pages:
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Facebook X (Twitter) Instagram Pinterest
    Facebook X (Twitter) Instagram Pinterest
    Ztoog
    • Home
    • The Future

      What is Project Management? 5 Best Tools that You Can Try

      Operational excellence strategy and continuous improvement

      Hannah Fry: AI isn’t as powerful as we think

      FanDuel goes all in on responsible gaming push with new Play with a Plan campaign

      Gettyimages.com Is the Best Website on the Internet Right Now

    • Technology

      Iran war: How could it end?

      Democratic senators question CFTC staffing cuts in Chicago enforcement office

      Google’s Cloud AI lead on the three frontiers of model capability

      AMD agrees to backstop a $300M loan from Goldman Sachs for Crusoe to buy AMD AI chips, the first known case of AMD chips used as debt collateral (The Information)

      Productivity apps failed me when I needed them most

    • Gadgets

      macOS Tahoe 26.3.1 update will “upgrade” your M5’s CPU to new “super” cores

      Lenovo Shows Off a ThinkBook Modular AI PC Concept With Swappable Ports and Detachable Displays at MWC 2026

      POCO M8 Review: The Ultimate Budget Smartphone With Some Cons

      The Mission: Impossible of SSDs has arrived with a fingerprint lock

      6 Best Phones With Headphone Jacks (2026), Tested and Reviewed

    • Mobile

      Android’s March update is all about finding people, apps, and your missing bags

      Watch Xiaomi’s global launch event live here

      Our poll shows what buyers actually care about in new smartphones (Hint: it’s not AI)

      Is Strava down for you? You’re not alone

      The Motorola Razr FIFA World Cup 2026 Edition was literally just unveiled, and Verizon is already giving them away

    • Science

      Big Tech Signs White House Data Center Pledge With Good Optics and Little Substance

      Inside the best dark matter detector ever built

      NASA’s Artemis moon exploration programme is getting a major makeover

      Scientists crack the case of “screeching” Scotch tape

      Blue-faced, puffy-lipped monkey scores a rare conservation win

    • AI

      Online harassment is entering its AI era

      Meet NullClaw: The 678 KB Zig AI Agent Framework Running on 1 MB RAM and Booting in Two Milliseconds

      New method could increase LLM training efficiency | Ztoog

      The human work behind humanoid robots is being hidden

      NVIDIA Releases DreamDojo: An Open-Source Robot World Model Trained on 44,711 Hours of Real-World Human Video Data

    • Crypto

      Google paid startup Form Energy $1B for its massive 100-hour battery

      Ethereum Breakout Alert: Corrective Channel Flip Sparks Impulsive Wave

      Show Your ID Or No Deal

      Jane Street sued for alleged front-running trades that accelerated Terraform Labs meltdown

      Bitcoin Trades Below ETF Cost-Basis As MVRV Signals Mounting Pressure

    Ztoog
    Home » Thousands of servers hacked in ongoing attack targeting Ray AI framework
    Technology

    Thousands of servers hacked in ongoing attack targeting Ray AI framework

    Facebook Twitter Pinterest WhatsApp
    Thousands of servers hacked in ongoing attack targeting Ray AI framework
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp

    Getty Images

    Thousands of servers storing AI workloads and community credentials have been hacked in an ongoing attack marketing campaign targeting a reported vulnerability in Ray, a computing framework utilized by OpenAI, Uber, and Amazon.

    The assaults, which have been energetic for not less than seven months, have led to the tampering of AI fashions. They have additionally resulted in the compromise of community credentials, permitting entry to inner networks and databases and tokens for accessing accounts on platforms together with OpenAI, Hugging Face, Stripe, and Azure. Besides corrupting fashions and stealing credentials, attackers behind the marketing campaign have put in cryptocurrency miners on compromised infrastructure, which generally supplies large quantities of computing energy. Attackers have additionally put in reverse shells, that are text-based interfaces for remotely controlling servers.

    Hitting the jackpot

    “When attackers get their hands on a Ray production cluster, it is a jackpot,” researchers from Oligo, the safety agency that noticed the assaults, wrote in a publish. “Valuable company data plus remote code execution makes it easy to monetize attacks—all while remaining in the shadows, totally undetected (and, with static security tools, undetectable).”

    Among the compromised delicate info are AI manufacturing workloads, which permit the attackers to regulate or tamper with fashions throughout the coaching part and, from there, corrupt the fashions’ integrity. Vulnerable clusters expose a central dashboard to the Internet, a configuration that permits anybody who appears for it to see a historical past of all instructions entered thus far. This historical past permits an intruder to shortly find out how a mannequin works and what delicate knowledge it has entry to.

    Advertisement

    Oligo captured screenshots that uncovered delicate personal knowledge and displayed histories indicating the clusters had been actively hacked. Compromised assets included cryptographic password hashes and credentials to inner databases and to accounts on OpenAI, Stripe, and Slack.

    • Kuberay Operator operating with Administrator permissions on the Kubernetes API.

    • Password hashes accessed

    • Production database credentials

    • AI mannequin in motion: dealing with a question submitted by a person in actual time. The mannequin may very well be abused by the attacker, who might doubtlessly modify buyer requests or responses.

    • Tokens for OpenAI, Stripe, Slack, and database credentials.

    • Cluster Dashboard with Production workloads and energetic duties

    Ray is an open supply framework for scaling AI apps, which means permitting enormous numbers of them to run without delay in an environment friendly method. Typically, these apps run on enormous clusters of servers. Key to creating all of this work is a central dashboard that gives an interface for displaying and controlling operating duties and apps. One of the programming interfaces accessible by the dashboard, generally known as the Jobs API, permits customers to ship an inventory of instructions to the cluster. The instructions are issued utilizing a easy HTTP request requiring no authentication.

    Last 12 months, researchers from safety agency Bishop Fox flagged the conduct as a high-severity code-execution vulnerability tracked as CVE-2023-48022.

    A distributed execution framework

    “In the default configuration, Ray does not enforce authentication,” wrote Berenice Flores Garcia, a senior safety guide at Bishop Fox. “As a result, attackers may freely submit jobs, delete existing jobs, retrieve sensitive information, and exploit the other vulnerabilities described in this advisory.”

    Anyscale, the developer and maintainer of Ray, responded by disputing the vulnerability. Anyscale officers mentioned they’ve at all times held out Ray as framework for remotely executing code and because of this, have lengthy suggested it must be correctly segmented inside a correctly secured community.

    Advertisement

    “Due to Ray’s nature as a distributed execution framework, Ray’s security boundary is outside of the Ray cluster,” Anyscale officers wrote. “That is why we emphasize that you must prevent access to your Ray cluster from untrusted machines (e.g., the public Internet).”

    The Anyscale response mentioned the reported conduct in the roles API wasn’t a vulnerability and wouldn’t be addressed in a near-term replace. The firm went on to say it might finally introduce a change that might implement authentication in the API. It defined:

    We have thought of very significantly whether or not or not one thing like that might be a good suggestion, and thus far haven’t applied it for worry that our customers would put an excessive amount of belief right into a mechanism that may find yourself offering the facade of safety with out correctly securing their clusters in the best way they imagined.

    That mentioned, we acknowledge that affordable minds can differ on this difficulty, and consequently have determined that, whereas we nonetheless don’t consider that a corporation ought to depend on isolation controls inside Ray like authentication, there may be worth in sure contexts in furtherance of a defense-in-depth technique, and so we are going to implement this as a brand new function in a future launch.

    Critics of the Anyscale response have famous that repositories for streamlining the deployment of Ray in cloud environments bind the dashboard to 0.0.0.0, an tackle used to designate all community interfaces and to designate port forwarding on the identical tackle. One such newbie boilerplate is out there on the Anyscale web site itself. Another instance of a publicly accessible weak setup is right here.

    Critics additionally notice Anyscale’s rivalry that the reported conduct is not a vulnerability has prevented many safety instruments from flagging assaults.

    An Anyscale consultant mentioned in an electronic mail the corporate plans to publish a script that can enable customers to simply confirm whether or not their Ray cases are uncovered to the Internet or not.

    The ongoing assaults underscore the significance of correctly configuring Ray. In the hyperlinks supplied above, Oligo and Anyscale record practices which can be important to locking down clusters. Oligo additionally supplied an inventory of indicators Ray customers can use to find out if their cases have been compromised.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp

    Related Posts

    Technology

    Iran war: How could it end?

    Technology

    Democratic senators question CFTC staffing cuts in Chicago enforcement office

    Technology

    Google’s Cloud AI lead on the three frontiers of model capability

    Technology

    AMD agrees to backstop a $300M loan from Goldman Sachs for Crusoe to buy AMD AI chips, the first known case of AMD chips used as debt collateral (The Information)

    Technology

    Productivity apps failed me when I needed them most

    Technology

    Makers are turning discarded vapes into tiny musical instruments

    Technology

    Best 85-Inch TV for 2026

    Technology

    Breaking Boundaries in Wireless Communication: Simulating Animated, On-Body RF Propagation

    Leave A Reply Cancel Reply

    Follow Us
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    Top Posts
    Gadgets

    37 Best Back-to-School Deals (2023): Laptops, Backpacks, Household Essentials

    Summer is Fading away, and college will quickly be again in session. We scoured the…

    The Future

    How Have Technological Improvements Impacted the Way We Travel?

    Traveling has modified because of technological developments, and these new improvements ship an much more…

    Technology

    Why the Galaxy S26 could become Samsung’s most divisive flagship yet

    We’re barely per week into 2026 and the 12 months isn’t shaping as much as…

    Science

    Los Angeles Just Proved How Spongy a City Can Be

    Earlier this month, the longer term fell on Los Angeles. An extended band of moisture…

    Mobile

    Amazon currently has a bonkers discount on the Samsung Galaxy S23 Ultra, the king of all Android phones

    The Samsung Galaxy S23 Ultra might be the finest Android telephone cash should buy proper…

    Our Picks
    Crypto

    Issuers Set New Record As Weekly Inflows Cross $2.2 Billion

    Mobile

    Genius, convenient, protective: meet Pitaka PinButton Case for Galaxy S4 Ultra

    Mobile

    OnePlus OxygenOS 13.1 rollout adds cellular sharing, app switching, and more

    Categories
    • AI (1,560)
    • Crypto (1,826)
    • Gadgets (1,870)
    • Mobile (1,910)
    • Science (1,939)
    • Technology (1,862)
    • The Future (1,716)
    Most Popular
    Gadgets

    The ThinkPhone Gets Two new Features Through Collaboration Between Motorola And Microsoft

    Crypto

    Coinbase Ranks As Second Largest ETH Staking Entity As Lido’s Dominance Raises Concerns

    Mobile

    Motorola Razr+ is now 30% off for Black Friday, yours for only $699.99

    Ztoog
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    © 2026 Ztoog.

    Type above and press Enter to search. Press Esc to cancel.