Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Initial Access appears in 2 case steps.
- 2Multiple attack methods. The case connects to 7 unique AI attack methods.
- 3Vulnerability mentions. The record connects 5 vulnerability identifiers to this case.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Reconnaissance
Step 1
Active Scanning
Adversaries can scan for public IP addresses to identify those potentially hosting Ray dashboards. Ray dashboards, by default, run on all network interfaces, which can expose them to the public internet if no other protective mechanisms are in place on the system.
-
Initial Access Once open Ray clusters have been identified, adversaries could use the Jobs API to invoke jobs onto accessible clusters. The Jobs API does not support any kind of authorization, so anyone with network access to the cluster can execute arbitrary code remotely.
-
Collection
Step 3
AI Artifact Collection
Adversaries could collect AI artifacts including production models and data. The researchers observed running production workloads from several organizations from a variety of industries.
-
Credential Access
Step 4
Unsecured Credentials
The attackers could collect unsecured credentials stored in the cluster. The researchers observed SSH keys, OpenAI tokens, HuggingFace tokens, Stripe tokens, cloud environment keys (AWS, GCP, Azure, Lambda Labs), Kubernetes secrets.
-
Exfiltration AI artifacts, credentials, and other valuable information can be exfiltrated via cyber means. The researchers found evidence of reverse shells on vulnerable clusters. They can be used to maintain persistence, continue to run arbitrary code, and exfiltrate.
-
Initial Access
Step 6
Model
HuggingFace tokens could allow the adversary to replace the victim organization's models with malicious variants.
-
Impact
Step 7
Financial Harm
Adversaries can cause financial harm to the victim organization. Exfiltrated credentials could be used to deplete credits or drain accounts. The GPU cloud resources themselves are costly. The researchers found evidence of cryptocurrency miners on vulnerable Ray clusters.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.