Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Artificial Intelligence

Ray AI Framework Vulnerability Exploited to Hack Hundreds of Clusters

Disputed Ray AI framework vulnerability exploited to steal information and deploy cryptominers on hundreds of clusters.

AI security

Attackers have been exploiting a missing authentication vulnerability in the Ray AI framework to compromise hundreds of clusters, application security firm Oligo reports.

The issue, tracked as CVE-2023-48022 and disclosed in November 2023, exists because, in its default configuration, the open source compute framework for AI does not enforce authentication and does not support any type of authorization model.

Attackers can exploit the flaw via Ray’s job submission API by submitting arbitrary system commands, allowing them to access all notes in the cluster and retrieve credentials.

According to Anyscale, which maintains the Ray framework, the lack of authentication is intentional, as users are responsible for enforcing security and isolation outside the cluster.

“The remaining CVE (CVE-2023-48022) – that Ray does not have authentication built in – is a long-standing design decision based on how Ray’s security boundaries are drawn and consistent with Ray deployment best practices,” Anyscale said in November.

The maintainers say they do plan to offer authentication in a future version of Ray, but the vulnerability remains ‘disputed’ for now, and unpatched. According to a NIST NVD advisory, CVE-2023-48022 has a CVSS score of 9.8.

While Anyscale calls for shared responsibility when securing Ray clusters, cybercriminals have taken notice of the framework’s lack of authentication enforcement and have been exploiting it since at least September 2023, two months before the issue was publicly disclosed.

[ Learn more about AI security at SecurityWeek’s AI Risk Summit ]

Advertisement. Scroll to continue reading.

Now, Oligo says it has observed hundreds of Ray clusters being hacked via this bug, with the attackers stealing a trove of information, including AI production workload data, database credentials, password hashes, SSH keys, and OpenAI, HuggingFace, and Stripe tokens.

Furthermore, many of the clusters ran with root privileges, providing access to sensitive cloud services, potentially leaking sensitive information, including customer data. The compromised clusters also exposed Kubernetes API access and Slack tokens.

Oligo, which has named the attack campaign ShadowRay, discovered that most of the compromised clusters were infected with cryptominers, including XMRig, NBMiner, and Java-based Zephyr miners, and reverse shells for persistent access.

“The first crypto-miner we noticed was installed on Feb. 21, 2024. We discovered that the IP has been accepting connections to the target port since Sept. 5, 2023, indicating the breach might have started before the vulnerability was disclosed. Due to the scale of the attacks and the chain of events, we believe the threat actors are probably part of a well-established hacking group,” Oligo says.

The security firm also notes that the attackers managed to evade detection by leveraging the Interactsh open source service for connection requests, and due to the exploited vulnerability being disputed, meaning that organizations are not even aware that they are at risk.

Update: In light of the malicious activity uncovered by Oligo, Anyscale announced the release of a client-side script and server-side code to help users identify Ray deployments with potentially exposed ports. However, the tooling is not guaranteed to identify all exposed ports and “does not attempt to validate what is running on the identified open port”.

Related: Shadow AI – Should I be Worried?

Related: Cloudflare Introduces AI Security Solutions

Related: Microsoft Releases Red Teaming Tool for Generative AI

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Artificial Intelligence

The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.