Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

ComfyUI exploitation campaign

Type
Campaign
Actors
❓Unknown
Pub. date
May 6, 2025
Initial access
Software misconfig
Impact
Unknown
Observed techniques
Exposed ComfyUI abuse
Observed tools
VShell
Targeted technologies
ComfyUI
References
https://anquan.baidu.com/article/1920
Status
Finalized
Last edited
May 11, 2025 12:05 PM

Baidu reports an exploitation campaign targeting publicly-exposed instances of ComfyUI. ComfyUI provides a GUI for AI image generation workflows. By default, it does not implement authentication. A popular extension, ComfyUI-Manager, allows an attacker to execute remote code via malicious model files. The attacker used a malicious model file, distributed on HuggingFace, to deploy a vshell based trojan with Cloudflare used as C2.

Made with 💙 by Wiz

Last Updated: April 3, 2025