ShadowRay 2.0: Active Global Campaign Hijacks Ray AI Infrastructure Into Self-Propagating Botnet
ShadowRay 2. 0 is a sophisticated global hacking campaign exploiting a vulnerability (CVE-2023-48022) in the Ray AI framework to hijack exposed computing clusters and build a self-propagating botnet. Attackers deliver payloads via GitLab and GitHub repositories, using AI-generated code to dynamically adapt their tactics. Initially focused on cryptojacking, the campaign has evolved to support multi-purpose botnet activities including DDoS attacks and data exfiltration. The operation leverages DevOps-style infrastructure for real-time malware updates, increasing its persistence and adaptability. This threat highlights the expanding attack surface in AI workloads and the risks posed by vulnerabilities in AI frameworks. No known public exploits are confirmed yet, but the campaign is active and targets exposed Ray clusters worldwide. Indicators include multiple CVEs, malicious hashes, IPs, domains, and URLs linked to the campaign. European organizations using Ray AI infrastructure are at risk, especially those with exposed clusters or insufficient network segmentation. Mitigation requires immediate vulnerability patching once available, restricting public exposure of AI clusters, and monitoring DevOps pipelines for suspicious activity.
AI Analysis
Technical Summary
ShadowRay 2.0 represents an advanced persistent threat campaign targeting the Ray AI framework, a popular distributed computing framework used for AI workloads. The attackers exploit CVE-2023-48022, a vulnerability that allows unauthorized control over exposed Ray clusters. By compromising these clusters, the adversaries convert them into nodes of a self-replicating botnet capable of multiple malicious functions. The campaign uses GitLab and GitHub repositories to deliver payloads, employing AI-generated code to continuously evolve and evade detection. Initially, the botnet focused on cryptojacking using tools like XMRig, but it has since expanded capabilities to include distributed denial-of-service (DDoS) attacks, data exfiltration, and network reconnaissance. The attackers utilize DevOps-style infrastructure, enabling real-time updates and modular malware deployment, which complicates traditional detection and response efforts. The campaign is attributed to the threat actor group IronErn440. Indicators of compromise include multiple CVEs (CVE-2023-48022, CVE-2024-50050, CVE-2025-49596), various malicious file hashes, IP addresses, and domains. The threat underscores the growing risks associated with AI infrastructure and the need for robust security controls around AI workloads and their orchestration environments. Although no confirmed public exploits are reported, the active campaign and available indicators suggest imminent risk to organizations running vulnerable Ray clusters.
Potential Impact
For European organizations, the ShadowRay 2.0 campaign poses significant risks due to the increasing adoption of AI and distributed computing frameworks like Ray. Compromise of AI clusters can lead to unauthorized resource consumption (cryptojacking), disruption of services through DDoS attacks, and leakage of sensitive data processed or stored within these environments. The self-propagating nature of the botnet increases the likelihood of rapid lateral movement and widespread infection within enterprise networks. Organizations relying on AI workloads for critical business functions or research may face operational downtime, reputational damage, and regulatory consequences under GDPR if personal data is exfiltrated. The use of DevOps pipelines for malware updates further complicates incident response and containment. Additionally, the campaign's use of legitimate platforms (GitHub, GitLab) for payload delivery may bypass traditional security controls, increasing the risk of successful compromise. The evolving sophistication of the threat actor and their ability to adapt AI-generated code means that static defenses may be insufficient, requiring continuous monitoring and proactive threat hunting.
Mitigation Recommendations
1. Immediately audit all Ray AI framework deployments to identify exposed clusters and restrict access to trusted networks only, using network segmentation and firewall rules. 2. Monitor DevOps pipelines and repositories (GitHub, GitLab) for unauthorized or suspicious activity, including unexpected code commits or pipeline executions. 3. Implement strict access controls and multi-factor authentication (MFA) for all infrastructure and code repositories involved in AI workloads. 4. Deploy runtime security monitoring on AI clusters to detect anomalous behaviors such as unusual network traffic, process spawning, or cryptomining activity. 5. Establish robust logging and alerting mechanisms focused on the indicators of compromise provided (hashes, IPs, domains). 6. Prepare incident response plans specifically addressing AI infrastructure compromise scenarios, including containment and eradication procedures. 7. Engage with vendors and security communities to track patch releases for CVE-2023-48022 and related vulnerabilities (CVE-2024-50050, CVE-2025-49596) and apply them promptly. 8. Conduct regular threat hunting exercises focusing on lateral movement techniques and persistence mechanisms used by the botnet. 9. Educate DevOps and AI teams about the risks of using public code repositories for payload delivery and enforce code review policies. 10. Consider deploying deception technologies or honeypots mimicking Ray clusters to detect early intrusion attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
Indicators of Compromise
- cve: CVE-2023-48022
- cve: CVE-2024-50050
- cve: CVE-2025-49596
- hash: 1f63fa7921c2f5fb8f8ffa430d02ac4a
- hash: 6c8f1cfc42ec1dd0a01d73a3e97627ef
- hash: 779a8af3b9838a33d1e199da3fc2f02a49e7c13e
- hash: f4dcb2dd842efcd7509728c5517317be8e28ef30
- hash: 1f6c69403678646a60925dcffe8509d22bb570c611324b93bec9aea72024ef6b
- hash: 6f445252494a0908ab51d526e09134cebc33a199384771acd58c4a87f1ffc063
- ip: 103.127.134.124
- ip: 104.194.151.181
- ip: 121.160.102.68
- ip: 193.29.224.83
- url: http://67.217.57.240:666/files/netsh
- domain: bwqqvqfgsseplyoltois92rdukv0mm5th.oast.fun
- domain: eu.zano.k1pool.com
ShadowRay 2.0: Active Global Campaign Hijacks Ray AI Infrastructure Into Self-Propagating Botnet
Description
ShadowRay 2. 0 is a sophisticated global hacking campaign exploiting a vulnerability (CVE-2023-48022) in the Ray AI framework to hijack exposed computing clusters and build a self-propagating botnet. Attackers deliver payloads via GitLab and GitHub repositories, using AI-generated code to dynamically adapt their tactics. Initially focused on cryptojacking, the campaign has evolved to support multi-purpose botnet activities including DDoS attacks and data exfiltration. The operation leverages DevOps-style infrastructure for real-time malware updates, increasing its persistence and adaptability. This threat highlights the expanding attack surface in AI workloads and the risks posed by vulnerabilities in AI frameworks. No known public exploits are confirmed yet, but the campaign is active and targets exposed Ray clusters worldwide. Indicators include multiple CVEs, malicious hashes, IPs, domains, and URLs linked to the campaign. European organizations using Ray AI infrastructure are at risk, especially those with exposed clusters or insufficient network segmentation. Mitigation requires immediate vulnerability patching once available, restricting public exposure of AI clusters, and monitoring DevOps pipelines for suspicious activity.
AI-Powered Analysis
Technical Analysis
ShadowRay 2.0 represents an advanced persistent threat campaign targeting the Ray AI framework, a popular distributed computing framework used for AI workloads. The attackers exploit CVE-2023-48022, a vulnerability that allows unauthorized control over exposed Ray clusters. By compromising these clusters, the adversaries convert them into nodes of a self-replicating botnet capable of multiple malicious functions. The campaign uses GitLab and GitHub repositories to deliver payloads, employing AI-generated code to continuously evolve and evade detection. Initially, the botnet focused on cryptojacking using tools like XMRig, but it has since expanded capabilities to include distributed denial-of-service (DDoS) attacks, data exfiltration, and network reconnaissance. The attackers utilize DevOps-style infrastructure, enabling real-time updates and modular malware deployment, which complicates traditional detection and response efforts. The campaign is attributed to the threat actor group IronErn440. Indicators of compromise include multiple CVEs (CVE-2023-48022, CVE-2024-50050, CVE-2025-49596), various malicious file hashes, IP addresses, and domains. The threat underscores the growing risks associated with AI infrastructure and the need for robust security controls around AI workloads and their orchestration environments. Although no confirmed public exploits are reported, the active campaign and available indicators suggest imminent risk to organizations running vulnerable Ray clusters.
Potential Impact
For European organizations, the ShadowRay 2.0 campaign poses significant risks due to the increasing adoption of AI and distributed computing frameworks like Ray. Compromise of AI clusters can lead to unauthorized resource consumption (cryptojacking), disruption of services through DDoS attacks, and leakage of sensitive data processed or stored within these environments. The self-propagating nature of the botnet increases the likelihood of rapid lateral movement and widespread infection within enterprise networks. Organizations relying on AI workloads for critical business functions or research may face operational downtime, reputational damage, and regulatory consequences under GDPR if personal data is exfiltrated. The use of DevOps pipelines for malware updates further complicates incident response and containment. Additionally, the campaign's use of legitimate platforms (GitHub, GitLab) for payload delivery may bypass traditional security controls, increasing the risk of successful compromise. The evolving sophistication of the threat actor and their ability to adapt AI-generated code means that static defenses may be insufficient, requiring continuous monitoring and proactive threat hunting.
Mitigation Recommendations
1. Immediately audit all Ray AI framework deployments to identify exposed clusters and restrict access to trusted networks only, using network segmentation and firewall rules. 2. Monitor DevOps pipelines and repositories (GitHub, GitLab) for unauthorized or suspicious activity, including unexpected code commits or pipeline executions. 3. Implement strict access controls and multi-factor authentication (MFA) for all infrastructure and code repositories involved in AI workloads. 4. Deploy runtime security monitoring on AI clusters to detect anomalous behaviors such as unusual network traffic, process spawning, or cryptomining activity. 5. Establish robust logging and alerting mechanisms focused on the indicators of compromise provided (hashes, IPs, domains). 6. Prepare incident response plans specifically addressing AI infrastructure compromise scenarios, including containment and eradication procedures. 7. Engage with vendors and security communities to track patch releases for CVE-2023-48022 and related vulnerabilities (CVE-2024-50050, CVE-2025-49596) and apply them promptly. 8. Conduct regular threat hunting exercises focusing on lateral movement techniques and persistence mechanisms used by the botnet. 9. Educate DevOps and AI teams about the risks of using public code repositories for payload delivery and enforce code review policies. 10. Consider deploying deception technologies or honeypots mimicking Ray clusters to detect early intrusion attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.oligo.security/blog/shadowray-2-0-attackers-turn-ai-against-itself-in-global-campaign-that-hijacks-ai-into-self-propagating-botnet"]
- Adversary
- IronErn440
- Pulse Id
- 691d46b4135d2acc04876592
- Threat Score
- null
Indicators of Compromise
Cve
| Value | Description | Copy |
|---|---|---|
cveCVE-2023-48022 | — | |
cveCVE-2024-50050 | — | |
cveCVE-2025-49596 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash1f63fa7921c2f5fb8f8ffa430d02ac4a | — | |
hash6c8f1cfc42ec1dd0a01d73a3e97627ef | — | |
hash779a8af3b9838a33d1e199da3fc2f02a49e7c13e | — | |
hashf4dcb2dd842efcd7509728c5517317be8e28ef30 | — | |
hash1f6c69403678646a60925dcffe8509d22bb570c611324b93bec9aea72024ef6b | — | |
hash6f445252494a0908ab51d526e09134cebc33a199384771acd58c4a87f1ffc063 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip103.127.134.124 | — | |
ip104.194.151.181 | — | |
ip121.160.102.68 | — | |
ip193.29.224.83 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://67.217.57.240:666/files/netsh | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainbwqqvqfgsseplyoltois92rdukv0mm5th.oast.fun | — | |
domaineu.zano.k1pool.com | — |
Threat ID: 691d8407ce29a4e4be9214c0
Added to database: 11/19/2025, 8:47:03 AM
Last enriched: 11/19/2025, 9:02:10 AM
Last updated: 11/20/2025, 9:41:59 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
HelixGuard uncovers malicious "spellchecker" packages on PyPI using multi-layer encryption to steal crypto wallets.
MediumThreatFox IOCs for 2025-11-19
MediumUK Exposes Bulletproof Hosting Operator Linked to BlackBasta, Evil Corp and LockBit Ransomware
MediumLicense to Encrypt: Make Their Move
MediumWEBJACK: Evolving IIS Hijacking Campaign Abuses SEO for Fraud and Monetization
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.