{"id":218248,"date":"2024-03-29T06:26:38","date_gmt":"2024-03-29T06:26:38","guid":{"rendered":"https:\/\/michigandigitalnews.com\/index.php\/2024\/03\/29\/massive-hack-hits-ai-servers-exploits-ray-framework-vulnerability\/"},"modified":"2025-06-25T17:19:43","modified_gmt":"2025-06-25T17:19:43","slug":"massive-hack-hits-ai-servers-exploits-ray-framework-vulnerability","status":"publish","type":"post","link":"https:\/\/michigandigitalnews.com\/index.php\/2024\/03\/29\/massive-hack-hits-ai-servers-exploits-ray-framework-vulnerability\/","title":{"rendered":"Massive hack hits AI servers, exploits Ray framework vulnerability"},"content":{"rendered":"<p> [ad_1]<br \/>\n<br \/><img decoding=\"async\" src=\"https:\/\/readwrite.com\/wp-content\/uploads\/2024\/03\/Massive-hack-hits-AI-servers-exploits-Ray-framework-vulnerability-900x600.png\" \/><\/p>\n<div>\n<p>Researchers have found that thousands of servers, running <a href=\"https:\/\/readwrite.com\/category\/ai\/\">AI<\/a> infrastructure, have been hacked in an active attack campaign. This attack targets a reported vulnerability in Ray, a computing framework used by the likes of OpenAI, Uber, and Amazon.<\/p>\n<p>According to analysts at Oligo, a cybersecurity firm, the vulnerability allows attackers to take over the companies\u2019 computing power and leak sensitive data. The blog post <a href=\"https:\/\/www.oligo.security\/blog\/shadowray-attack-ai-workloads-actively-exploited-in-the-wild\" target=\"_blank\" rel=\"noopener\">stated<\/a> that this flaw has been under active exploitation for the last seven months, affecting sectors like education, cryptocurrency, biopharma and more.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">I discovered an active attack campaign targeting a vulnerability in Ray. Thousands of companies running AI infrastructure are exposed to the attack through a critical vulnerability that is under dispute and thus has no patch.<\/p>\n<p>It all began with a client that was using Ray. <a href=\"https:\/\/t.co\/BrVr2p8yOu\">pic.twitter.com\/BrVr2p8yOu<\/a><\/p>\n<p>\u2014 Avi (@avi_lum) <a href=\"https:\/\/twitter.com\/avi_lum\/status\/1772607464703209824?ref_src=twsrc%5Etfw\">March 26, 2024<\/a><\/p>\n<\/blockquote>\n<p>They claim that a trove of sensitive information from compromised servers has been leaked, targeting entities such as <a href=\"https:\/\/readwrite.com\/openais-chatgpt-faces-cyberattack-induced-outages\/\">OpenAI<\/a>, <a href=\"https:\/\/readwrite.com\/hugging-face-confirms-free-open-source-ai-assistant-service-alternative-to-openai\/\">Hugging Face<\/a>, Stripe, and Slack, as well as cloud environments like <a href=\"https:\/\/readwrite.com\/lessons-learned-after-amazon-w\/\">Amazon\u2019s AWS<\/a> and <a href=\"https:\/\/readwrite.com\/us-government-emails-hacked-what-you-need-to-know\/\">Microsoft Azure<\/a>.<\/p>\n<p>Oligo reports that it discovered hundreds of compromised clusters, with hackers allegedly installing cryptocurrency miners on compromised infrastructure. The researchers explain that attackers choose to compromise these machines because they can obtain valuable sensitive information, and GPUs are very expensive and difficult to obtain.<\/p>\n<p>The company reports that GPU on-demand prices on AWS can reach an annual cost of $858,480 per machine, which means the total amount of machines and computing power that might have been compromised is estimated to be worth almost a billion dollars. Attackers have also installed reverse shells, which are text-based interfaces that allow for remote server control.<\/p>\n<p>In a statement, it continued: \u201cWhen attackers get their hands on a Ray production cluster, it is a jackpot. Valuable company data plus remote code execution makes it easy to monetize attacks\u2014all while remaining in the shadows, totally undetected (and, with static security tools, undetectable).<\/p>\n<h2>What is the Ray AI framework?<\/h2>\n<p>Ray, an open-source unified compute framework, simplifies the scaling of AI and Python workloads, including everything from reinforcement learning and deep learning to tuning and model serving.<\/p>\n<p>These applications generally operate on large clusters of servers. A central dashboard serves as an interface for displaying and managing active tasks and applications. Among the programming interfaces accessible via this dashboard is the Jobs API. It enables users to dispatch a list of commands to the cluster through a straightforward HTTP request that doesn\u2019t require authentication.<\/p>\n<p>In November 2023, analysts from the security outlet Bishop Fox <a href=\"https:\/\/bishopfox.com\/blog\/ray-versions-2-6-3-2-8-0\" target=\"_blank\" rel=\"noopener\">spotted<\/a> a similar vulnerability in Ray, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-48022\" target=\"_blank\" rel=\"noopener\">tracked<\/a> as CVE-2023-48022. Bishop Fox senior consultant Berenice Flores Garcia wrote in a blog post: \u201cIn the default configuration, Ray does not enforce authentication. As a result, attackers may freely submit jobs, delete existing jobs, retrieve sensitive information, and exploit the other vulnerabilities described in this advisory. \u201c<\/p>\n<h2>Anyscale response<\/h2>\n<p>A spokesperson for Anyscale, the developer behind Ray, confirmed to ReadWrite that there were a number of issues it was fixing. In a statement, they <a href=\"https:\/\/www.anyscale.com\/blog\/update-on-ray-cve-2023-48022-new-verification-tooling-available\" target=\"_blank\" rel=\"noopener\">said<\/a>: \u201cIn light of reports of malicious activity, we have moved quickly to provide tooling to allow users to verify proper configuration of their clusters to avoid accidental exposure.\u201d<\/p>\n<p>They also said the firm was providing a client-side script and server-side code and that it had pre-configured the defaults of the client-side script to reach out to a server it has set up, simplifying the process of determining whether or not ports are unexpectedly open.<\/p>\n<p>Last October, the company had initially denied the reports stating that four of the five reported bugs had already been fixed in November. They disputed the term \u201cvulnerability,\u201d referring to it as a bug instead.<\/p>\n<p>It <a href=\"https:\/\/www.anyscale.com\/blog\/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023\" target=\"_blank\" rel=\"noopener\">added<\/a>: \u201cWe recognize that reasonable minds can differ on this issue, and consequently have decided that, while we still do not believe that an organization should rely on isolation controls within Ray like authentication, there can be value in certain contexts in furtherance of a defense-in-depth strategy, and so we will implement this as a new feature in a future release.\u201d<\/p>\n<p><em>Featured image: DALL-E<\/em><\/p>\n<\/p><\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/>[ad_2]<br \/>\n<br \/><a href=\"https:\/\/readwrite.com\/massive-hack-hits-ai-servers-exploits-ray-framework-vulnerability\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ad_1] Researchers have found that thousands of servers, running AI infrastructure, have been hacked in an active attack campaign. This attack targets a reported vulnerability<\/p>\n","protected":false},"author":1,"featured_media":218249,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[152],"tags":[],"_links":{"self":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/218248"}],"collection":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/comments?post=218248"}],"version-history":[{"count":1,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/218248\/revisions"}],"predecessor-version":[{"id":333030,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/posts\/218248\/revisions\/333030"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media\/218249"}],"wp:attachment":[{"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/media?parent=218248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/categories?post=218248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/michigandigitalnews.com\/index.php\/wp-json\/wp\/v2\/tags?post=218248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}