Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hackers Hijack Ray AI Framework for Global Cryptojacking Operation
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hackers Hijack Ray AI Framework for Global Cryptojacking Operation

Highlights

  • Hackers exploited an unpatched flaw in Ray, targeting exposed compute infrastructure.

  • The campaign focused on hijacking GPU resources for cryptocurrency mining operations.

  • Security experts urge organizations to secure AI frameworks and minimize internet exposure.

Ethan Moreno
Last updated: 19 November, 2025 - 12:49 am 12:49 am
Ethan Moreno 2 hours ago
Share
SHARE

Contents
How Did Attackers Compromise Ray and Its Infrastructure?What Impact Has the Attack Had on AI Compute Resources?How Are Platforms and Vendors Responding to Security Concerns?

A recent investigation reveals that cybercriminals have exploited Ray, a popular open-source AI framework, redirecting its resources for unauthorized cryptocurrency mining on a global scale. The exploitation targets a security flaw in Ray’s API, which allows attackers to execute unauthenticated remote code, effectively taking control of critical compute infrastructure. Organizations relying on Ray—including startups, research labs, and AI cloud environments—now face increased risk as hackers leverage these powerful systems for personal gain. Despite warnings to secure Ray for internal use, many continue to deploy it on publicly accessible networks, making them easy targets for sophisticated attackers. This ongoing campaign not only impacts operational costs but also threatens the integrity and availability of essential AI technologies.

Incidents involving Ray previously made headlines for similar vulnerabilities, but this campaign marks a shift in both scale and attacker sophistication. Earlier attacks often used direct exploits or common vulnerabilities, whereas current hackers have focused on manipulating Ray’s orchestration features for stealthier and more efficient cryptojacking. The persistence of the underlying flaw (CVE-2023-48022) and a lack of decisive vendor action have intensified the risk, as prior efforts did little to prevent these sophisticated infiltrations. The attackers have demonstrated adaptability, switching development platforms from GitLab to GitHub as earlier actions by security teams forced takedowns, indicating an escalating contest over valuable GPU resources in the cloud.

How Did Attackers Compromise Ray and Its Infrastructure?

Attackers accessed exposed Ray servers by exploiting the Job Submission API, sending fraudulent jobs through Ray’s dashboard to distribute malware. These servers, sometimes cloud-hosted or maintained by research labs and startups, were inadvertently left open to the public. By using Ray’s own scheduling and orchestration tools—technologies originally designed to manage computing resources for AI and data processing—hackers operated largely undetected. Oligo researchers described the technique as using Ray infrastructure as intended but for malicious operations.

What Impact Has the Attack Had on AI Compute Resources?

The cryptojacking campaign has significantly affected those utilizing Ray by diverting premium hardware, particularly NVIDIA A100 GPUs, for unauthorized cryptocurrency mining. Attackers tailored their job submissions to match the available hardware, maximizing gain while evading monitoring tools. Competition between cybercriminal groups and legitimate users over compute resources was observed, with techniques like CPU usage limiting and process disguise employed to avoid detection.

How Are Platforms and Vendors Responding to Security Concerns?

Security platforms like GitHub have responded by removing accounts linked to malware activities and affirming their dedication to security. A spokesperson for GitHub stated,

“In response to malicious activity, we have removed the accounts that violate GitHub’s Acceptable Use Policies, which prohibit content that supports malware campaigns.”

However, the core API vulnerability remains unresolved, with the vendor disputing the need for a patch on the grounds that Ray should only run in secured networks. Oligo researchers emphasize that this advice is frequently overlooked:

“In practice however, users often deploy Ray without heeding this warning, which creates an extended window for exploitation, evidenced by its continued and expanded weaponization by attackers in the wild.”

Evidence uncovered by researchers suggests the attackers have used obfuscation tools and code generated by Large Language Models to further mask their activities. Their adaptability is seen in their migration from one development platform to another, as previous repositories were removed after being flagged for malicious activity. Despite these countermeasures, the campaign continues, highlighting the difficulties of safeguarding widely adopted open-source environments like Ray against persistent, coordinated threats.

Organizations operating AI infrastructure dependent on open platforms such as Ray should closely evaluate their internal deployment practices and avoid exposing sensitive interfaces to the public internet. While Ray’s vendor maintains the system is intended for controlled environments, real-world trends show that misconfiguration continues to present significant opportunities for attackers. Efforts to fully patch vulnerabilities or provide more robust defaults could reduce future risks, but responsibility also falls on users to mitigate exposure through network segmentation and vigilant monitoring. The ongoing incidents underscore the growing tension between rapid AI adoption and the challenges of maintaining adequate cybersecurity in high-performance computing environments.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

CISO Stress Rises as Security Teams Battle Growing Threats

Fortinet Delays Warning as Critical Firewall Flaw Faces Widespread Attacks

Canada Strengthens Cyber Defenses and Talent to Counter Rising Digital Threats

Justice Department Dismantles North Korean IT Labor Schemes in US

Chinese Hackers Use Claude AI in Espionage, Rely on Human Oversight

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Tim Cain Urges Game Developers to Focus on Core Experiences
Next Article Leaders Tackle A.I. Hurdles by Focusing on Data and Clear Goals

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Tesla Gains Approval to Deploy Robotaxi Service Across Arizona
Electric Vehicle
Zoox Begins Public Robotaxi Rides in San Francisco
Robotics
Klarna Expands Banking Services and Reports Strong Revenue Growth
Technology
Leaders Tackle A.I. Hurdles by Focusing on Data and Clear Goals
AI Technology
Tim Cain Urges Game Developers to Focus on Core Experiences
Gaming
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?