Beware of AI Pickpockets: Pickai Backdoor Spreading Through ComfyUI Vulnerability
A new backdoor named Pickai is exploiting ComfyUI vulnerabilities to spread and steal sensitive AI data. Developed in C++, Pickai offers remote command execution and reverse shell capabilities with strong persistence and evasion techniques. It uses multiple C2 servers for redundancy and has infected nearly 700 devices globally. The malware is hosted on Rubick.ai, an AI e-commerce platform serving major brands, posing significant supply chain risks. Pickai employs various obfuscation methods, including string encryption, process disguise, and multiple persistence mechanisms. Its network communication uses a three-tier timing strategy for C2 communication and device information reporting.
AI Analysis
Technical Summary
Pickai is a sophisticated backdoor malware developed in C++ that exploits vulnerabilities in ComfyUI, a user interface framework used in AI applications. The malware enables remote command execution and reverse shell capabilities, allowing attackers to gain persistent and stealthy control over infected systems. Pickai employs multiple advanced evasion and persistence techniques, including string encryption to obfuscate its code, process disguise to avoid detection by security tools, and multiple mechanisms to maintain persistence across system reboots. It communicates with its command and control (C2) infrastructure using a three-tier timing strategy, which helps evade network-based detection by varying communication intervals. The malware uses multiple C2 servers for redundancy, ensuring continued control even if some servers are taken down. Notably, Pickai has infected nearly 700 devices globally and is hosted on Rubick.ai, an AI e-commerce platform that serves major brands, indicating a significant supply chain risk. This supply chain vector could allow the malware to spread widely through trusted AI software components or updates. The malware's primary objective appears to be the theft of sensitive AI data, which could include proprietary models, training data, or intellectual property. Indicators of compromise include several file hashes, IP addresses, and URLs linked to the malware’s infrastructure. Despite the lack of a specific CVE or known exploits in the wild, the malware’s capabilities and infection scale suggest a well-developed threat targeting AI ecosystems through ComfyUI vulnerabilities.
Potential Impact
For European organizations, especially those involved in AI development, research, or deployment, Pickai poses a significant risk. The theft of sensitive AI data can lead to intellectual property loss, competitive disadvantage, and potential regulatory penalties under GDPR if personal data is involved. The malware’s persistence and evasion techniques make detection and removal challenging, increasing the risk of prolonged unauthorized access. The supply chain aspect, involving Rubick.ai, raises concerns for companies relying on AI e-commerce platforms or third-party AI components, as infections could propagate through trusted software updates or integrations. Additionally, the remote command execution and reverse shell capabilities could allow attackers to pivot within networks, escalate privileges, and disrupt AI services or broader IT infrastructure. This could impact availability and integrity of AI systems critical for business operations. The infection of nearly 700 devices globally indicates a non-trivial spread, suggesting that European organizations using ComfyUI or related AI tools could be targeted or collateral victims. The malware’s use of multiple C2 servers and obfuscation complicates incident response and forensic analysis.
Mitigation Recommendations
1. Conduct immediate vulnerability assessments on all systems running ComfyUI or related AI UI frameworks to identify potential exposure. 2. Implement strict network segmentation and monitoring for AI development environments to limit lateral movement if infection occurs. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting obfuscation techniques such as string encryption and process disguise. 4. Monitor network traffic for anomalous patterns consistent with three-tier timing strategies and communications to known C2 IPs and URLs associated with Pickai. 5. Validate and verify the integrity of AI software components and updates sourced from Rubick.ai or similar platforms, employing cryptographic signatures and supply chain security best practices. 6. Establish incident response playbooks specific to AI infrastructure compromises, including rapid isolation and forensic analysis of affected systems. 7. Educate AI development and IT teams about the risks of supply chain attacks and the importance of secure coding and update practices. 8. Regularly update and patch ComfyUI and related dependencies as vendors release fixes, even though no specific patches are currently listed, maintain vigilance for future advisories. 9. Utilize threat intelligence feeds to stay updated on new indicators of compromise related to Pickai and integrate them into security monitoring tools. 10. Consider implementing application allowlisting and restricting execution of unauthorized binaries in AI environments to reduce infection risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden
Indicators of Compromise
- hash: 0641a20bde5bc620f115975c15d0cf40
- hash: 7bc08ae32a2e0c9e07c98c2ade45c7f0
- hash: 8680f76a9faaa7f62967da8a66f5a59c
- hash: c587e4596fce1de62d132f46ca1f03de
- hash: ebd188be8e7ad72219fd9a227881dd8d
- hash: f9c955a27207a1be327a1f7ed8bcdcaa
- hash: fe9896eca398167f5d0304e555d170eb
- ip: 102.214.30.199
- ip: 154.68.72.34
- ip: 195.43.6.252
- ip: 38.180.207.9
- ip: 80.75.169.227
- url: http://78.47.151.49:8878/wp-content/x64
- url: https://rubick.ai/wp-content/config.json
- url: https://rubick.ai/wp-content/tmux.conf
- url: https://rubick.ai/wp-content/vim.json
Beware of AI Pickpockets: Pickai Backdoor Spreading Through ComfyUI Vulnerability
Description
A new backdoor named Pickai is exploiting ComfyUI vulnerabilities to spread and steal sensitive AI data. Developed in C++, Pickai offers remote command execution and reverse shell capabilities with strong persistence and evasion techniques. It uses multiple C2 servers for redundancy and has infected nearly 700 devices globally. The malware is hosted on Rubick.ai, an AI e-commerce platform serving major brands, posing significant supply chain risks. Pickai employs various obfuscation methods, including string encryption, process disguise, and multiple persistence mechanisms. Its network communication uses a three-tier timing strategy for C2 communication and device information reporting.
AI-Powered Analysis
Technical Analysis
Pickai is a sophisticated backdoor malware developed in C++ that exploits vulnerabilities in ComfyUI, a user interface framework used in AI applications. The malware enables remote command execution and reverse shell capabilities, allowing attackers to gain persistent and stealthy control over infected systems. Pickai employs multiple advanced evasion and persistence techniques, including string encryption to obfuscate its code, process disguise to avoid detection by security tools, and multiple mechanisms to maintain persistence across system reboots. It communicates with its command and control (C2) infrastructure using a three-tier timing strategy, which helps evade network-based detection by varying communication intervals. The malware uses multiple C2 servers for redundancy, ensuring continued control even if some servers are taken down. Notably, Pickai has infected nearly 700 devices globally and is hosted on Rubick.ai, an AI e-commerce platform that serves major brands, indicating a significant supply chain risk. This supply chain vector could allow the malware to spread widely through trusted AI software components or updates. The malware's primary objective appears to be the theft of sensitive AI data, which could include proprietary models, training data, or intellectual property. Indicators of compromise include several file hashes, IP addresses, and URLs linked to the malware’s infrastructure. Despite the lack of a specific CVE or known exploits in the wild, the malware’s capabilities and infection scale suggest a well-developed threat targeting AI ecosystems through ComfyUI vulnerabilities.
Potential Impact
For European organizations, especially those involved in AI development, research, or deployment, Pickai poses a significant risk. The theft of sensitive AI data can lead to intellectual property loss, competitive disadvantage, and potential regulatory penalties under GDPR if personal data is involved. The malware’s persistence and evasion techniques make detection and removal challenging, increasing the risk of prolonged unauthorized access. The supply chain aspect, involving Rubick.ai, raises concerns for companies relying on AI e-commerce platforms or third-party AI components, as infections could propagate through trusted software updates or integrations. Additionally, the remote command execution and reverse shell capabilities could allow attackers to pivot within networks, escalate privileges, and disrupt AI services or broader IT infrastructure. This could impact availability and integrity of AI systems critical for business operations. The infection of nearly 700 devices globally indicates a non-trivial spread, suggesting that European organizations using ComfyUI or related AI tools could be targeted or collateral victims. The malware’s use of multiple C2 servers and obfuscation complicates incident response and forensic analysis.
Mitigation Recommendations
1. Conduct immediate vulnerability assessments on all systems running ComfyUI or related AI UI frameworks to identify potential exposure. 2. Implement strict network segmentation and monitoring for AI development environments to limit lateral movement if infection occurs. 3. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting obfuscation techniques such as string encryption and process disguise. 4. Monitor network traffic for anomalous patterns consistent with three-tier timing strategies and communications to known C2 IPs and URLs associated with Pickai. 5. Validate and verify the integrity of AI software components and updates sourced from Rubick.ai or similar platforms, employing cryptographic signatures and supply chain security best practices. 6. Establish incident response playbooks specific to AI infrastructure compromises, including rapid isolation and forensic analysis of affected systems. 7. Educate AI development and IT teams about the risks of supply chain attacks and the importance of secure coding and update practices. 8. Regularly update and patch ComfyUI and related dependencies as vendors release fixes, even though no specific patches are currently listed, maintain vigilance for future advisories. 9. Utilize threat intelligence feeds to stay updated on new indicators of compromise related to Pickai and integrate them into security monitoring tools. 10. Consider implementing application allowlisting and restricting execution of unauthorized binaries in AI environments to reduce infection risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://blog.xlab.qianxin.com/pickai_backdoor_exploits_comfyui-is-your-ai-at-risk_cn/"]
- Adversary
- null
- Pulse Id
- 684bd7d3b9ea8f2eadcc407c
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash0641a20bde5bc620f115975c15d0cf40 | — | |
hash7bc08ae32a2e0c9e07c98c2ade45c7f0 | — | |
hash8680f76a9faaa7f62967da8a66f5a59c | — | |
hashc587e4596fce1de62d132f46ca1f03de | — | |
hashebd188be8e7ad72219fd9a227881dd8d | — | |
hashf9c955a27207a1be327a1f7ed8bcdcaa | — | |
hashfe9896eca398167f5d0304e555d170eb | — |
Ip
Value | Description | Copy |
---|---|---|
ip102.214.30.199 | — | |
ip154.68.72.34 | — | |
ip195.43.6.252 | — | |
ip38.180.207.9 | — | |
ip80.75.169.227 | — |
Url
Value | Description | Copy |
---|---|---|
urlhttp://78.47.151.49:8878/wp-content/x64 | — | |
urlhttps://rubick.ai/wp-content/config.json | — | |
urlhttps://rubick.ai/wp-content/tmux.conf | — | |
urlhttps://rubick.ai/wp-content/vim.json | — |
Threat ID: 684bdf0ca8c9212743803700
Added to database: 6/13/2025, 8:19:24 AM
Last enriched: 6/13/2025, 8:34:46 AM
Last updated: 6/16/2025, 3:52:21 AM
Views: 2
Related Threats
ThreatFox IOCs for 2025-06-15
MediumThreatFox IOCs for 2025-06-14
MediumUnusual toolset used in recent Fog Ransomware attack
MediumThreatFox IOCs for 2025-06-13
MediumFrom Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.