Hackers are actively attacking Ray software clusters to steal data and mine cryptocurrency. Cybersecurity experts from Oligo warn that this is the second major wave of attacks targeting a critical flaw discovered years ago.
Ray is a popular open-source tool that helps developers run Python programs faster by distributing work across multiple computers. These groups of computers, called clusters, rely on a central node to manage tasks and distribute workloads.
The trouble goes back to 2023. Researchers found that Ray versions 2.6.3 and 2.8.0 contained a gap that allowed strangers to run code remotely through the job submission tool. However, Anyscale, the company behind Ray, chose not to release a traditional patch. They argued that Ray is a tool designed for “strictly-controlled network environments.” In short, they told users it was their responsibility to build walls around the software.
Criminals took that as an invitation. Oligo tracks the current attacking group as “IronErn440.” This group uses AI to write malicious code and sneaks it into the clusters through the unprotected API. Once inside, they download malware from public sites such as GitHub and GitLab.
The attackers primarily want to mine cryptocurrency. They install the XMRig miner but use a clever trick to stay hidden. Instead of using 100% of the computer’s power, which would cause the system to lag and alert the owner, they cap usage at 60%. This keeps the machines running smoothly enough that the theft often goes unnoticed.
The problem is growing rapidly. Researchers say over 230,000 Ray servers are currently exposed to the open internet. This is a massive jump from just a few thousand when the flaw first appeared. Without a built-in fix from the developer, these servers remain easy targets for anyone looking to steal computing power or hijack networks for DDoS attacks.











