Close Menu
Ztoog
    What's Hot
    Crypto

    Argentina Welcomes First Pro-Bitcoin President, BTC Price Surges Above $37,000

    Technology

    Why Monday.com decided to build its new database instead of buying one

    The Future

    Michael Schumacher’s family awarded €200,000 compensation after AI ‘interview’

    Important Pages:
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    Facebook X (Twitter) Instagram Pinterest
    Facebook X (Twitter) Instagram Pinterest
    Ztoog
    • Home
    • The Future

      How I Turn Unstructured PDFs into Revenue-Ready Spreadsheets

      Is it the best tool for 2025?

      The clocks that helped define time from London’s Royal Observatory

      Summer Movies Are Here, and So Are the New Popcorn Buckets

      India-Pak conflict: Pak appoints ISI chief, appointment comes in backdrop of the Pahalgam attack

    • Technology

      Ensure Hard Work Is Recognized With These 3 Steps

      Cicada map 2025: Where will Brood XIV cicadas emerge this spring?

      Is Duolingo the face of an AI jobs crisis?

      The US DOD transfers its AI-based Open Price Exploration for National Security program to nonprofit Critical Minerals Forum to boost Western supply deals (Ernest Scheyder/Reuters)

      The more Google kills Fitbit, the more I want a Fitbit Sense 3

    • Gadgets

      Maono Caster G1 Neo & PD200X Review: Budget Streaming Gear for Aspiring Creators

      Apple plans to split iPhone 18 launch into two phases in 2026

      Upgrade your desk to Starfleet status with this $95 USB-C hub

      37 Best Graduation Gift Ideas (2025): For College Grads

      Backblaze responds to claims of “sham accounting,” customer backups at risk

    • Mobile

      Samsung Galaxy S25 Edge promo materials leak

      What are people doing with those free T-Mobile lines? Way more than you’d expect

      Samsung doesn’t want budget Galaxy phones to use exclusive AI features

      COROS’s charging adapter is a neat solution to the smartwatch charging cable problem

      Fortnite said to return to the US iOS App Store next week following court verdict

    • Science

      Failed Soviet probe will soon crash to Earth – and we don’t know where

      Trump administration cuts off all future federal funding to Harvard

      Does kissing spread gluten? New research offers a clue.

      Why Balcony Solar Panels Haven’t Taken Off in the US

      ‘Dark photon’ theory of light aims to tear up a century of physics

    • AI

      How to build a better AI benchmark

      Q&A: A roadmap for revolutionizing health care through data-driven innovation | Ztoog

      This data set helps researchers spot harmful stereotypes in LLMs

      Making AI models more trustworthy for high-stakes settings | Ztoog

      The AI Hype Index: AI agent cyberattacks, racing robots, and musical models

    • Crypto

      ‘The Big Short’ Coming For Bitcoin? Why BTC Will Clear $110,000

      Bitcoin Holds Above $95K Despite Weak Blockchain Activity — Analytics Firm Explains Why

      eToro eyes US IPO launch as early as next week amid easing concerns over Trump’s tariffs

      Cardano ‘Looks Dope,’ Analyst Predicts Big Move Soon

      Speak at Ztoog Disrupt 2025: Applications now open

    Ztoog
    Home » Thousands of servers hacked in ongoing attack targeting Ray AI framework
    Technology

    Thousands of servers hacked in ongoing attack targeting Ray AI framework

    Facebook Twitter Pinterest WhatsApp
    Thousands of servers hacked in ongoing attack targeting Ray AI framework
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp

    Getty Images

    Thousands of servers storing AI workloads and community credentials have been hacked in an ongoing attack marketing campaign targeting a reported vulnerability in Ray, a computing framework utilized by OpenAI, Uber, and Amazon.

    The assaults, which have been energetic for not less than seven months, have led to the tampering of AI fashions. They have additionally resulted in the compromise of community credentials, permitting entry to inner networks and databases and tokens for accessing accounts on platforms together with OpenAI, Hugging Face, Stripe, and Azure. Besides corrupting fashions and stealing credentials, attackers behind the marketing campaign have put in cryptocurrency miners on compromised infrastructure, which generally supplies large quantities of computing energy. Attackers have additionally put in reverse shells, that are text-based interfaces for remotely controlling servers.

    Hitting the jackpot

    “When attackers get their hands on a Ray production cluster, it is a jackpot,” researchers from Oligo, the safety agency that noticed the assaults, wrote in a publish. “Valuable company data plus remote code execution makes it easy to monetize attacks—all while remaining in the shadows, totally undetected (and, with static security tools, undetectable).”

    Among the compromised delicate info are AI manufacturing workloads, which permit the attackers to regulate or tamper with fashions throughout the coaching part and, from there, corrupt the fashions’ integrity. Vulnerable clusters expose a central dashboard to the Internet, a configuration that permits anybody who appears for it to see a historical past of all instructions entered thus far. This historical past permits an intruder to shortly find out how a mannequin works and what delicate knowledge it has entry to.

    Advertisement

    Oligo captured screenshots that uncovered delicate personal knowledge and displayed histories indicating the clusters had been actively hacked. Compromised assets included cryptographic password hashes and credentials to inner databases and to accounts on OpenAI, Stripe, and Slack.

    • Kuberay Operator operating with Administrator permissions on the Kubernetes API.

    • Password hashes accessed

    • Production database credentials

    • AI mannequin in motion: dealing with a question submitted by a person in actual time. The mannequin may very well be abused by the attacker, who might doubtlessly modify buyer requests or responses.

    • Tokens for OpenAI, Stripe, Slack, and database credentials.

    • Cluster Dashboard with Production workloads and energetic duties

    Ray is an open supply framework for scaling AI apps, which means permitting enormous numbers of them to run without delay in an environment friendly method. Typically, these apps run on enormous clusters of servers. Key to creating all of this work is a central dashboard that gives an interface for displaying and controlling operating duties and apps. One of the programming interfaces accessible by the dashboard, generally known as the Jobs API, permits customers to ship an inventory of instructions to the cluster. The instructions are issued utilizing a easy HTTP request requiring no authentication.

    Last 12 months, researchers from safety agency Bishop Fox flagged the conduct as a high-severity code-execution vulnerability tracked as CVE-2023-48022.

    A distributed execution framework

    “In the default configuration, Ray does not enforce authentication,” wrote Berenice Flores Garcia, a senior safety guide at Bishop Fox. “As a result, attackers may freely submit jobs, delete existing jobs, retrieve sensitive information, and exploit the other vulnerabilities described in this advisory.”

    Anyscale, the developer and maintainer of Ray, responded by disputing the vulnerability. Anyscale officers mentioned they’ve at all times held out Ray as framework for remotely executing code and because of this, have lengthy suggested it must be correctly segmented inside a correctly secured community.

    Advertisement

    “Due to Ray’s nature as a distributed execution framework, Ray’s security boundary is outside of the Ray cluster,” Anyscale officers wrote. “That is why we emphasize that you must prevent access to your Ray cluster from untrusted machines (e.g., the public Internet).”

    The Anyscale response mentioned the reported conduct in the roles API wasn’t a vulnerability and wouldn’t be addressed in a near-term replace. The firm went on to say it might finally introduce a change that might implement authentication in the API. It defined:

    We have thought of very significantly whether or not or not one thing like that might be a good suggestion, and thus far haven’t applied it for worry that our customers would put an excessive amount of belief right into a mechanism that may find yourself offering the facade of safety with out correctly securing their clusters in the best way they imagined.

    That mentioned, we acknowledge that affordable minds can differ on this difficulty, and consequently have determined that, whereas we nonetheless don’t consider that a corporation ought to depend on isolation controls inside Ray like authentication, there may be worth in sure contexts in furtherance of a defense-in-depth technique, and so we are going to implement this as a brand new function in a future launch.

    Critics of the Anyscale response have famous that repositories for streamlining the deployment of Ray in cloud environments bind the dashboard to 0.0.0.0, an tackle used to designate all community interfaces and to designate port forwarding on the identical tackle. One such newbie boilerplate is out there on the Anyscale web site itself. Another instance of a publicly accessible weak setup is right here.

    Critics additionally notice Anyscale’s rivalry that the reported conduct is not a vulnerability has prevented many safety instruments from flagging assaults.

    An Anyscale consultant mentioned in an electronic mail the corporate plans to publish a script that can enable customers to simply confirm whether or not their Ray cases are uncovered to the Internet or not.

    The ongoing assaults underscore the significance of correctly configuring Ray. In the hyperlinks supplied above, Oligo and Anyscale record practices which can be important to locking down clusters. Oligo additionally supplied an inventory of indicators Ray customers can use to find out if their cases have been compromised.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp

    Related Posts

    Technology

    Ensure Hard Work Is Recognized With These 3 Steps

    Technology

    Cicada map 2025: Where will Brood XIV cicadas emerge this spring?

    Technology

    Is Duolingo the face of an AI jobs crisis?

    Technology

    The US DOD transfers its AI-based Open Price Exploration for National Security program to nonprofit Critical Minerals Forum to boost Western supply deals (Ernest Scheyder/Reuters)

    Technology

    The more Google kills Fitbit, the more I want a Fitbit Sense 3

    Technology

    Sorry Shoppers, Amazon Says Tariff Cost Feature ‘Is Not Going to Happen’

    Technology

    Vibe Coding, Vibe Checking, and Vibe Blogging – O’Reilly

    Technology

    Robot Videos: Cargo Robots, Robot Marathons, and More

    Leave A Reply Cancel Reply

    Follow Us
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    Top Posts
    Science

    Planned moon landings could pelt orbiting spacecraft with dusty debris

    Artist’s depiction of the Blue Origin’s Blue Moon lander, which NASA has chosen for its…

    Mobile

    All our favorite new Quest and PSVR 2 games from the UploadVR Showcase 2023

    The bi-annual UploadVR Showcase has simply wrapped up its Summer 2023 present. Over 60 games…

    Crypto

    Forget High Gas Fee Challenges, Ethereum Remains Bullish: Time To Buy More?

    Despite issues over community congestion and excessive gasoline charges, Ethereum stays bullish in the long…

    Mobile

    TikTokers worry that they won’t be able to “educate” kids if TikTok is banned

    The objective of a system is what it does. Not what it says it’s doing.Reuters…

    The Future

    OPPO Unveils Reno12 Series and Watch X in Australia: AI-Powered Innovation at Your Fingertips

    Leading expertise model OPPO has introduced the upcoming launch of the OPPO Reno12 Series and…

    Our Picks
    Science

    Cosmic dust may have been crucial to the beginnings of life on Earth

    AI

    Google Research Introduces TimesFM: A Single Forecasting Model Pre-Trained on a Large Time-Series Corpus of 100B Real World Time-Points

    AI

    VulScribeR: A Large Language Model-Based Approach for Generating Diverse and Realistic Vulnerable Code Samples

    Categories
    • AI (1,482)
    • Crypto (1,744)
    • Gadgets (1,796)
    • Mobile (1,839)
    • Science (1,853)
    • Technology (1,789)
    • The Future (1,635)
    Most Popular
    Technology

    The Growing Georgia Trump election investigation, explained

    Science

    The small Texas town where you can sip AND soak in mineral water

    Crypto

    Ethereum Bears Gain Upper Hand With Escalating Sell-Off

    Ztoog
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • About Us
    • Contact us
    • Privacy Policy
    • Terms & Conditions
    © 2025 Ztoog.

    Type above and press Enter to search. Press Esc to cancel.