AI Under Siege: ShadowRay 2.0 Turns Orchestration into Global Cryptojacking Playground
Threat actors are exploiting the ShadowRay vulnerability in the Ray framework, turning AI infrastructure into cryptomining and botnet launchpads. This campaign highlights how attackers hijack misconfigured AI environments to run unauthorized workloads. With over 230,000 exposed Ray environments, ShadowRay 2.0 shows the risk of ignoring configuration best practices.

Hot Take:
When AI meets vulnerability, it’s like giving a raccoon the keys to your unprotected dumpster—expect chaos, cryptomining, and a call for better locks. The ShadowRay 2.0 campaign is a stark reminder that even the most brilliant AI isn’t immune to becoming a minion in a cybercriminal’s plot. Who knew AI infrastructure could moonlight as a villain’s lair?
Key Points:
- Disputed RCE vulnerability in Ray framework exploited by threat actors.
- Operation “ShadowRay 2.0” hijacks AI infrastructure for cryptomining and further attacks.
- Attackers initially used GitLab, then moved to GitHub after exposure.
- Ongoing campaign impacts sectors like cryptocurrency, education, and biopharma.
- Oligo Security stresses the importance of securing Ray environments.
Already a member? Log in here
