-
The ongoing attack campaign targeting the Ray AI framework has resulted in the hacking of servers storing AI workloads and network credentials.
-
Attackers have tampered with AI models, compromised network credentials, and installed cryptocurrency miners and reverse shells on compromised servers.
-
Researchers from Oligo, the security firm that discovered the attacks, highlighted the severity of the situation, emphasizing the ease with which attackers can monetize the compromised data.
-
The compromised data includes AI production workloads, cryptographic password hashes, and credentials to internal databases and various accounts.
-
Anyscale, the developer of Ray, disputed the reported vulnerability, stating that Ray's security boundary is outside the Ray cluster and advising proper network segmentation.
-
Critics have pointed out that the lack of authentication enforcement in Ray's default configuration poses significant security risks, allowing attackers to freely submit jobs and retrieve sensitive information.
-
Properly configuring Ray and following security best practices are crucial to prevent such attacks and secure AI workloads.
[link] [comments]
from hacking: security in practice https://ift.tt/c2h9tuy
Comments
Post a Comment