From AI Workstation to Proxy Exit Node: GHOST Campaign Targets Japan's Unauthenticated ComfyUI Deployments
- 4 days ago
- 7 min read
Md. Azim Uddn - Unit Zero, Pipeline Threat Intelligence Team

Executive Summary
Unit Zero Threat Intelligence has been tracking an active campaign, now formally disclosed by Censys ARC on April 7, 2026, that systematically targets internet-exposed ComfyUI servers globally, including 21 confirmed instances identified in Japan.
Threat actors are converting GPU-rich AI image generation infrastructure into dual-purpose criminal assets: Monero and Conflux cryptocurrency mining rigs and Hysteria v2 proxy botnet exit nodes available for resale.
Japan's AI adoption has accelerated significantly recently. ComfyUI was deployed widely across creative studios, research labs, and individual practitioners, many of whom operate their instances without authentication.
This blog provides a Japan-specific threat assessment, technical breakdown, and actionable remediation guidance for defenders operating in the Japanese ecosystem.
Threat Summary
Attribute | Details |
Threat Name | GHOST Botnet / ComfyUI Cryptominer Campaign |
Threat Type | Cryptomining / Proxy Botnet |
Japan Exposure | 21 publicly accessible ComfyUI instances identified |
Malware Family | GHOST v5.1 (ghost.sh), XMRig, lolMiner, Hysteria v2 |
Coins Mined | Monero (XMR) via XMRig; Conflux (CFX) via lolMiner |
C2 Infrastructure | Flask dashboard on port 3301 — Aeza Group (bulletproof hosting) |

Using Censys internet-wide scan data, Unit Zero identified 21 publicly accessible ComfyUI instances with Japanese IP address attribution. While this figure may appear to be a small number against a global pool of 1,000+ exposed instances, context is critical for Japan-region defenders.
A Japanese IP address with GPU capacity is worth more to this threat actor than a dozen compromised servers elsewhere. The attack surface is small. The value is not. - Unit Zero
Why Japan Instances Are High-Value Targets
• Japanese AI practitioners frequently deploy ComfyUI on high-end NVIDIA GPU servers (A100, H100, RTX 4090 class hardware), precisely the hardware that generates the highest crypto-mining hashrates.
• Japan's culture of adopting AI in enterprises often favors ease of access over security hardening, particularly in creative industry deployments. Unauthenticated public-facing ports are common in small studio and research environments.
• The GHOST scanner's curated IP range lists actively target cloud deployments in the AWS Tokyo (ap-northeast-1), GCP asia-northeast1, and Oracle Cloud Japan regions.
• A compromised Japanese cloud GPU instance can generate significantly more Monero per unit time than a standard CPU server, making Japan's AI infrastructure disproportionately attractive.
• Proxy exit nodes in Japan have premium resale value on underground markets, given Japan's high-bandwidth infrastructure and reputational 'clean' IP space that bypasses many geo-blocks.
Of the 21 Japanese instances identified, a subset are likely to have ComfyUI-Manager installed (enabling the scanner's silent malicious package installation pathway), and at least some are expected to run custom nodes that include dangerous execution-capable components such as FL_CodeNode or SrlEval. Unit Zero strongly recommends all operators of these 21 instances treat themselves as potentially compromised until a full forensic review is completed.
Attack Chain: Step by Step

C2 Infrastructure & Dual Monetization Model
The campaign's operational sophistication is most evident in its centrally managed command-and-control infrastructure. A Flask-based C2 dashboard running on port 3301 assigns each compromised host a unique identifier derived from the hostname (format: vm<hex>) and logs real-time CPU and GPU hashrates, mining pool, accepted shares, hardware inventory, and OS details into an embedded SQLite database.
The Hysteria v2 proxy fleet is also run by the same C2 panel. Each compromised node registers its Hysteria URI with the C2, enabling the operator to bulk-export a list of functional proxy exit nodes, suggesting a secondary business of selling residential-quality proxy access using Japanese and other high-value IP ranges. The dual mining and proxy components share the same C2 credentials and URL, indicating a single operator managing both revenue streams.
Indicators of Compromise (IOCs)
Type | Indicator | Context |
IP | 77[.]110[.]96[.]200 | Attacker open directory / tool hosting (Aeza Group) |
IP | 120[.]241[.]40[.]237 | Linked to Redis worm campaign, pivot from GHOST operator |
File | ghost.sh (GHOST v5.1) | Second-stage loader/miner dropper |
File | ComfyUI-Shell-Executor | Malicious pip package for RCE via ComfyUI-Manager |
Port | 3301/TCP | Flask-based C2 dashboard |
Process | XMRig (kernel-name masquerade) | Monero miner — hidden via LD_PRELOAD rootkit |
Process | lolMiner | Conflux miner binary |
Service | Hysteria v2 (masquerades as bing.com TLS) | Proxy botnet listener |
Path | /var/tmp/, ~/.cache/ | GHOST dropper hidden artifact locations |
Path | /var/tmp/, ~/.cache/ | GHOST dropper hidden artifact locations |
Pool | Kryptex mining pool | Primary mining pool used by operator wallets |
Detection Guidance for Japan Operators
Detection Point | What to Look For |
Process Names | Kernel-like names with unusual hex suffixes (e.g. kworker[u8:2-a3f1]) |
Network Traffic | Outbound connections to Kryptex pool endpoints (port 3333/TCP) |
Network Traffic | Hysteria v2 TLS traffic masquerading as bing.com (port 443) |
File System | Hidden directories in /var/tmp/ or ~/.cache/ with backdated timestamps |
File System | chattr +i flag set on unexpected binaries |
ComfyUI | Unknown packages under custom_nodes/ (esp. ComfyUI-Shell-Executor) |
ComfyUI | Default startup workflow modified (userdata/workflows/) |
ComfyUI | Node named 'GPU Performance Monitor' (fake persistence node) |
System | LD_PRELOAD set to unknown shared library — rootkit indicator |
Remediation & Hardening Recommendations
Immediate Actions (If You Operate ComfyUI)
STOP EXPOSING COMFYUI DIRECTLY TO THE INTERNET. Place it behind a VPN or authenticated reverse proxy (nginx + HTTP Basic Auth + TLS minimum; Cloudflare Access is preferred). This single action eliminates the entire attack surface.
Please conduct an immediate audit of your custom_nodes/ Remove any package you did not explicitly install—especially ComfyUI-Shell-Executor and any "GPU Performance Monitor" node.
Review user data/workflows for any startup workflows you did not create. The poisoned default workflow executes the exploit on every restart.
Examine for LD_PRELOAD entries in /etc/ld.so.preload and /etc/environment. An unexpected library here is a definitive rootkit indicator.
Scan for locked files: lsattr -R /var/tmp/ ~/.cache/ — unexpected 'i' (immutable) flags indicate GHOST malware artifacts.
Kill and remove any process with a kernel-like name containing a hex suffix (e.g., kworker[0:1-a3f1]).
Please rotate all credentials associated with the ComfyUI server. SSH keys, cloud API keys, and any secrets in environment variables should be considered compromised.
If ComfyUI's process user has granted root access, assume full system compromise and perform a clean rebuild from a verified image.
Hardening Checklist (Preventive)
Never expose ComfyUI on 0.0.0.0 without authentication; bind to 127.0.0.1 and use a reverse proxy with authentication.
Disable or restrict ComfyUI-Manager's remote install capability in production environments.
Remove or sandbox dangerous custom nodes that accept raw Python execution (FL_CodeNode, SrlEval, similar).
Run ComfyUI as a dedicated non-root service user with minimal filesystem permissions.
Deploy network-level monitoring: alert on unexpected outbound traffic to port 3333/TCP (mining) or unusual Kryptex/XMRig process names.
Perform periodic self-scans using the query above to verify your ComfyUI instances are not publicly reachable.
If you are using AWS, GCP, or Oracle Cloud in Japan, review the Security Groups and VPC firewall rules to ensure that port 8188 is NOT permitted from 0.0.0.0/0.
Analyst Commentary from Unit Zero Perspective
This campaign represents a meaningful evolution in the targeting of AI infrastructure. Historically, cryptomining botnets focused on poorly secured web servers, exposed Docker APIs, or misconfigured cloud storage. The shift to GPU-accelerated AI platforms reflects a mature understanding of where high-value compute has migrated in 2025–2026.
Japan's position in the threat landscape here is nuanced. The country's rapid enterprise AI deployment, particularly in creative industries and R&D environments, has produced a class of exposed infrastructure that operators do not conceptually treat as 'servers' in the traditional security sense. ComfyUI is often perceived as a 'creative tool,' not a production service requiring hardening. This cognitive gap is the real vulnerability being exploited.
The dual-revenue model (mining + proxy resale) demonstrates increasingly sophisticated operational planning. Proxy exit nodes with Japanese IP addresses command a premium in underground markets; Japanese IP ranges are frequently needed by actors targeting services that geo-block by country, including Japanese government portals, financial institutions, and regional streaming services. An operator who can bulk-sell Japanese IP access is building a persistent monetization stream that outlasts the mining operation.
Censys's assessment that the tooling 'appears hastily assembled' should not reduce threat priority. The effectiveness of the campaign does not rely on sophistication; it relies on an enormous pool of misconfigured targets doing nothing to prevent it. With 21 exposed Japanese instances currently visible, and given that ComfyUI's user community is growing rapidly in Japan, this attack surface will expand unless the community receives clear, accessible hardening guidance.
MITRE ATT&CK Mapping
Tactic | Technique ID | Details |
Initial Access | T1190 | Exploit Public-Facing Application (ComfyUI RCE via custom nodes) |
Execution | T1059.006 | Python-based malicious workflow execution via /prompt endpoint |
Persistence | T1543 | Backdoored startup workflow; fake GPU Monitor node; cron-like 6-hour refetch |
Defense Evasion | T1564.001 | Hidden files in /var/tmp/, ~/.cache/ with backdated timestamps |
Defense Evasion | T1574.006 | LD_PRELOAD rootkit hiding miner processes from ps/top/ls |
Defense Evasion | T1222 | chattr +i on miner binaries to prevent deletion |
Discovery | T1046 | ZMap-based scanning to propagate the worm to adjacent vulnerable hosts |
Resource Development | T1584 | Use of Aeza Group bulletproof hosting for C2/payload hosting |
Impact | T1496 | Resource Hijacking — Monero (XMRig) and Conflux (lolMiner) mining |
Impact | T1496 | Resource Hijacking — Monero (XMRig) and Conflux (lolMiner) mining |
Reference
Censys ARC — Mark Ellzey. "ComfyUI Servers Being Turned into Cryptomining Proxy Botnet." April 7, 2026.
The Hacker News. "Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign." April 7, 2026.
GBHackers. "ComfyUI Servers Hijacked for Cryptomining, Proxy Botnet Ops." April 8, 2026.
Snyk Security. "ComfyUI Custom Node RCE Research." December 2024.
Pulsedive Threat Intelligence. "Botnet Activity Report H1/H2 2025."
MITRE ATT&CK Framework v15. https://attack.mitre.org
Summary: Recommended Measures and Immediate Actions
A key feature of this GHOST campaign is that it targets AI environments directly, rather than traditional “servers.” In Japan in particular, many systems are publicly exposed online in the name of convenience, making them highly attractive to attackers as “high-performance yet unprotected assets.”
Therefore, rather than implementing individual countermeasures, it is crucial to re-evaluate your operational assumptions.
What PIPELINE Inc. Can Do
In cases like this, it is not just about one-off countermeasures;
a mechanism for continuous “visibility” is essential.
PIPELINE Inc. can provide the following support:
① Visualization of Externally Exposed Assets
Continuously monitor how your company’s domains and IP addresses appear from the internet
Early detection of unintended exposure (including ComfyUI)
② Risk-Based Prioritization
Identify “high-risk assets” such as GPU servers and cloud environments
Clarify where to start
③ Continuous Monitoring and Alerts
Regularly check for suspicious port exposures, network traffic, and configuration changes
Support detection at the pre-incident stage
④ Designing countermeasures tailored to actual operations
Security design based on the premise of a “configuration that is easy to use in the field”
Improvement proposals that balance convenience and security
Finally
AI environments are often introduced as “tools,” but
the moment they are exposed to the outside world, they become assets that carry exactly the same risks as servers.
The recent GHOST campaign is a prime example of an attack that exploited this gap in awareness.
First,please start by checking how your company’s AI environment appears from the outside.
![[Third Week of April 2026] Cyberattacks on Japanese Companies: 3 Real Incidents and Countermeasures PIPELINE](https://static.wixstatic.com/media/95ec1f_e7dbeb31d3524c4fbf50a37cf6d208b9~mv2.png/v1/fill/w_366,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/95ec1f_e7dbeb31d3524c4fbf50a37cf6d208b9~mv2.webp)
![[Third Week of April 2026] Cyberattacks on Japanese Companies: 3 Real Incidents and Countermeasures PIPELINE](https://static.wixstatic.com/media/95ec1f_e7dbeb31d3524c4fbf50a37cf6d208b9~mv2.png/v1/fill/w_980,h_670,fp_0.50_0.50,q_95,enc_avif,quality_auto/95ec1f_e7dbeb31d3524c4fbf50a37cf6d208b9~mv2.webp)




![[Third Week of April 2026] Cyberattacks on Japanese Companies: 3 Real Incidents and Countermeasures PIPELINE](https://static.wixstatic.com/media/95ec1f_e7dbeb31d3524c4fbf50a37cf6d208b9~mv2.png/v1/fill/w_444,h_250,fp_0.50_0.50,q_35,blur_30,enc_avif,quality_auto/95ec1f_e7dbeb31d3524c4fbf50a37cf6d208b9~mv2.webp)
![[Third Week of April 2026] Cyberattacks on Japanese Companies: 3 Real Incidents and Countermeasures PIPELINE](https://static.wixstatic.com/media/95ec1f_e7dbeb31d3524c4fbf50a37cf6d208b9~mv2.png/v1/fill/w_385,h_217,fp_0.50_0.50,q_95,enc_avif,quality_auto/95ec1f_e7dbeb31d3524c4fbf50a37cf6d208b9~mv2.webp)









