HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

Cryptomining Botnet Hijacks Over 1,000 Exposed ComfyUI AI Instances

Threat actors are scanning cloud IP ranges for internet‑exposed ComfyUI deployments, installing malicious nodes via ComfyUI‑Manager and turning them into cryptocurrency‑mining and proxy bots. The campaign affects AI/ML SaaS providers and any organization using unsecured ComfyUI instances, creating cost overruns and potential supply‑chain risk.

LiveThreat™ Intelligence · 📅 April 08, 2026· 📰 thehackernews.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
5 recommended
📰
Source
thehackernews.com

Cryptomining Botnet Hijacks Over 1,000 Exposed ComfyUI AI Instances

What Happened – Threat actors deployed a Python‑based scanner that sweeps large cloud IP blocks for internet‑exposed instances of ComfyUI, a popular Stable Diffusion UI. When an unprotected instance is found, the scanner automatically installs a malicious node via the ComfyUI‑Manager component, enrolling the host in a cryptocurrency‑mining and proxy botnet. Over 1,000 such instances have been confirmed compromised.

Why It Matters for TPRM

  • Unsecured third‑party AI services can be weaponised, driving unexpected compute costs and degrading performance for your organization.
  • Compromised nodes may be used as stepping stones for broader attacks against your supply chain or data assets.
  • The campaign highlights the need for strict configuration and continuous monitoring of cloud‑exposed vendor tools.

Who Is Affected – SaaS AI/ML platforms, cloud hosting providers, enterprises that deploy ComfyUI for internal or customer‑facing image generation, and any downstream services that rely on those instances.

Recommended Actions

  • Inventory all ComfyUI deployments across your vendor ecosystem.
  • Verify that instances are not publicly reachable; enforce network segmentation and firewall rules.
  • Patch or upgrade ComfyUI‑Manager to the latest version and disable unnecessary remote APIs.
  • Implement continuous scanning for exposed ports and anomalous mining activity.
  • Require vendors to provide evidence of secure configuration and monitoring controls.

Technical Notes – The attack leverages a misconfiguration (publicly exposed HTTP endpoints) rather than a known CVE. The malicious payload is delivered through the ComfyUI‑Manager script, which runs with the same privileges as the UI service, allowing the attacker to install crypto‑miner binaries and proxy services. Source: The Hacker News

📰 Original Source
https://thehackernews.com/2026/04/over-1000-exposed-comfyui-instances.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.