Comprehensive Threat Exposure Management Platform
The ShadowRay 2.0 campaign represents a sophisticated attack operation targeting exposed Ray AI framework clusters worldwide. Discovered in September 2024 and resurging in November 2025, this cryptojacking and data theft campaign exploits the unpatched vulnerability CVE-2023-48022 in Anyscale Ray to compromise over 200,000 exposed Ray servers globally. Threat actor IronErn440 orchestrates this ShadowRay attack using DevOps-style infrastructure, AI-generated payloads, and Ray’s built-in orchestration features to create self-propagating cryptojacking botnets.
The ShadowRay 2.0 attack campaign transforms compromised Ray clusters into multi-purpose botnets capable of cryptocurrency mining, autonomous spreading, sensitive data theft from AI workloads, and launching offensive DDoS operations across the internet. Attackers masquerade XMRig miners as system processes while siphoning sensitive data and hijacking GPUs for profit.
The ShadowRay 2.0 campaign exploits CVE-2023-48022, a remote code execution vulnerability in the Ray AI framework that enables unauthenticated code execution through Ray’s Jobs API. This vulnerability remains unpatched because it stems from Ray’s design assumptions that clusters operate within secured and isolated environments. With no official vendor patch available and hundreds of thousands of Ray servers exposed online, attackers have leveraged this flaw since March 2024.
The threat actor IronErn440 attributed to this campaign employed DevOps-style infrastructure using GitLab and GitHub repositories to host evolving malware payloads. The operation unfolded in two rapid waves: the first wave emerged in early November 2025 using GitLab until the account was terminated on November 5, followed by a second wave through GitHub repositories launched November 10 that continued pushing updates despite multiple takedowns.
Attack techniques demonstrated by ShadowRay 2.0 include AI-generated reconnaissance scripts, multi-stage Python payloads, hidden persistence mechanisms through cron jobs and systemd services, GPU-optimized cryptojacking using XMRig miner, large-scale victim scanning, and DDoS tooling. The payloads were engineered for stealth by throttling CPU usage and disguising harmful processes as legitimate system operations. Attackers also battled rival cryptojackers for dominance over compromised systems.
Lock Down Ray Cluster Ports: Ensure Ray dashboard and Jobs API are not exposed to the public internet. Place them behind a firewall, VPN, or private network segment to prevent attackers from reaching exploitable endpoints.
Enable Authentication Controls: Ray is frequently deployed without authentication by default. Enable access controls, implement strong API keys, and integrate identity management wherever possible. Treat Ray infrastructure as production-critical systems requiring robust security.
Restrict Job Submission Permissions: Limit job submission capabilities to a small group of trusted users or service accounts to prevent attackers from abusing Ray’s job features for malicious code execution.
Monitor for CPU/GPU Anomalies: Unusual compute usage approaching 100% often indicates cryptomining activity. Configure alerts for unexpected CPU/GPU spikes, new processes, or unknown Python scripts executing during off-hours.
Keep Infrastructure Updated: Regularly update Ray versions, operating systems, and cloud images. While CVE-2023-48022 lacks a direct patch, newer releases include improved security guidance and deployment hardening recommendations.
IPv4 Addresses:
Domains:
Subdomain:
SHA256:
MD5: 1f63fa7921c2f5fb8f8ffa430d02ac4a
SHA1: 779a8af3b9838a33d1e199da3fc2f02a49e7c13e
Malicious Filenames:
File Paths:
GitLab Repository: gitlab.com/ironern440-group/ironern440-project
GitLab Users: ironern440-group, least3654, thisisforwork440-ops
Monero Wallet: 45MinZ6ECgTgxn8gbm5gAsK9ATrEN6N95hbH3g4r5N4bKwH8QxuFygw3G7VwHwAusR9L35E4YjWYdTJaWDjbMGDCKYNz5X1
ZANO Wallet: KrQtbtsrPTqSTzQwZZisiyJxgtcDMwrdVrQ
Tactics:
Techniques:
Get through updates and upcoming events, and more directly in your inbox