Servers hacked in ongoing attack targeting Ray AI framework

  • The ongoing attack campaign targeting the Ray AI framework has resulted in the hacking of servers storing AI workloads and network credentials.

  • Attackers have tampered with AI models, compromised network credentials, and installed cryptocurrency miners and reverse shells on compromised servers.

  • Researchers from Oligo, the security firm that discovered the attacks, highlighted the severity of the situation, emphasizing the ease with which attackers can monetize the compromised data.

  • The compromised data includes AI production workloads, cryptographic password hashes, and credentials to internal databases and various accounts.

  • Anyscale, the developer of Ray, disputed the reported vulnerability, stating that Ray's security boundary is outside the Ray cluster and advising proper network segmentation.

  • Critics have pointed out that the lack of authentication enforcement in Ray's default configuration poses significant security risks, allowing attackers to freely submit jobs and retrieve sensitive information.

  • Properly configuring Ray and following security best practices are crucial to prevent such attacks and secure AI workloads.

Source: https://arstechnica.com/security/2024/03/thousands-of-servers-hacked-in-ongoing-attack-targeting-ray-ai-framework/

submitted by /u/NuseAI
[link] [comments]

from hacking: security in practice https://ift.tt/c2h9tuy

Comments