CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

ComfyUI cryptomining botnet campaign leverages exposed instances via custom nodes and ComfyUI-Manager for RCE

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

An opportunistic cryptomining and proxy botnet campaign is actively recruiting over 1,000 internet-exposed ComfyUI instances—an open-source Stable Diffusion platform—via remote code execution (RCE) exploits against unauthenticated deployments and ComfyUI-Manager installations. The attack chain begins with a Python-based scanner that enumerates cloud IP ranges for vulnerable ComfyUI instances, identifying those with custom node families that accept raw Python code execution or ComfyUI-Manager installations. Successful exploitation installs malware that mines Monero and Conflux, and adds compromised hosts to the Hysteria V2 botnet, all managed through a Flask-based C2 dashboard. The operation includes sophisticated persistence mechanisms, competitor botnet sabotage, and evidence-clearing techniques, indicating a technically competent yet opportunistic actor targeting widely deployed AI inference services for financial gain.

Timeline

  1. 07.04.2026 15:46 1 articles · 7h ago

    ComfyUI cryptomining and proxy botnet campaign expands to over 1,000 exposed instances via RCE

    A Python-based scanner continuously enumerates cloud IP ranges for ComfyUI instances and exploits RCE via vulnerable custom nodes or ComfyUI-Manager installations. Compromised hosts are enrolled in XMRig/Monero and lolMiner/Conflux mining operations and added to a Hysteria V2 proxy botnet, managed through a Flask-based C2 dashboard. The attacker uses advanced persistence techniques, competitor botnet sabotage (e.g., Hisana), and evidence-clearing, while leveraging bulletproof hosting infrastructure associated with Aeza Group.

    Show sources

Information Snippets