<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Thousands of servers hacked in ongoing attack targeting Ray AI framework in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Thousands-of-servers-hacked-in-ongoing-attack-targeting-Ray-AI/m-p/68873#M1153</link>
    <description>Infra and Payments and LLMs! Oh My!</description>
    <pubDate>Sat, 30 Mar 2024 13:53:27 GMT</pubDate>
    <dc:creator>Early_Adopter</dc:creator>
    <dc:date>2024-03-30T13:53:27Z</dc:date>
    <item>
      <title>Thousands of servers hacked in ongoing attack targeting Ray AI framework</title>
      <link>https://community.isc2.org/t5/Threats/Thousands-of-servers-hacked-in-ongoing-attack-targeting-Ray-AI/m-p/68870#M1152</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thousands of servers storing AI workloads and network credentials have been hacked in an ongoing attack campaign targeting a reported vulnerability in Ray, a computing framework used by OpenAI, Uber, and Amazon.&lt;/P&gt;&lt;P&gt;The attacks, which have been active for at least seven months, have led to the tampering of AI models. They have also resulted in the compromise of network credentials, allowing access to internal networks and databases and tokens for accessing accounts on platforms including OpenAI, Hugging Face, Stripe, and Azure. Besides corrupting models and stealing credentials, attackers behind the campaign have installed cryptocurrency miners on compromised infrastructure, which typically provides massive amounts of computing power. Attackers have also installed reverse shells, which are text-based interfaces for remotely controlling servers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://arstechnica.com/security/2024/03/thousands-of-servers-hacked-in-ongoing-attack-targeting-ray-ai-framework/" target="_blank"&gt;https://arstechnica.com/security/2024/03/thousands-of-servers-hacked-in-ongoing-attack-targeting-ray-ai-framework/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 06:19:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Thousands-of-servers-hacked-in-ongoing-attack-targeting-Ray-AI/m-p/68870#M1152</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-03-30T06:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: Thousands of servers hacked in ongoing attack targeting Ray AI framework</title>
      <link>https://community.isc2.org/t5/Threats/Thousands-of-servers-hacked-in-ongoing-attack-targeting-Ray-AI/m-p/68873#M1153</link>
      <description>Infra and Payments and LLMs! Oh My!</description>
      <pubDate>Sat, 30 Mar 2024 13:53:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Thousands-of-servers-hacked-in-ongoing-attack-targeting-Ray-AI/m-p/68873#M1153</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2024-03-30T13:53:27Z</dc:date>
    </item>
  </channel>
</rss>

