• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Experts Find 1600+ Malicious Docker Hub Images

You are here: Home / General Cyber Security News / Experts Find 1600+ Malicious Docker Hub Images
November 25, 2022

Security researchers have warned developers of the hazards of applying shared container images, just after obtaining 1652 on Docker Hub hiding nefarious material.

Containers are ever more popular among the developer group as they are light-weight, and effortless to deploy and scale across various computing environments.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


As with the use of open up resource code repositories, DevOps teams typically use publicly out there container photos that have been shared by other folks, to velocity up time-to-industry. The most common free of charge container registry is Docker Hub.

Even so, Sysdig warned in a new report that danger actors are hiding malware in legitimate-hunting illustrations or photos stored in Docker Hub. Though the variety of malicious containers it discovered was a little proportion of the 250,000 analyzed during the exploration, they illustrate the prospective risk to builders.

The most typical malware forms relevant to crypto-mining (37%), adopted by embedded tricks (17%). These techniques are most frequently SSH keys, AWS credentials Github tokens and NPM tokens, it reported.

“Secrets can be embedded in an impression because of to unintentionally lousy coding techniques or this could be performed intentionally by a risk actor,” the report noted.

“By embedding an SSH essential or an API essential into the container, the attacker can acquire entry as soon as the container is deployed. To avert accidental leakage of credentials, delicate info scanning equipment can notify people as element of the progress cycle.”

Sysdig also warned that menace actors generally hide their malware by naming visuals to mimic popular open source application, in the hope that a careless developer will slide for the trick.

Other typical malicious graphic classes bundled proxy avoidance (16%), freshly registered domains (8%) and destructive internet sites (8%).

The vendor urged developers to consider preemptive action, to scan publicly readily available visuals for prospective threats.

“The approaches employed by malicious actors explained by Sysdig are precisely targeted at cloud and container workloads,” it concluded.

“Organizations deploying these kinds of workloads must ensure that they enact correct preventative and detective security controls that are capable of mitigating cloud-targeting attacks.”

Editorial credit score icon picture: Sundry Photography / Shutterstock.com


Some areas of this write-up are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Global Police Celebrate $130m Cyber Busts
Next Post: Google rolls out patch for high-severity Chrome browser zero day google rolls out patch for high severity chrome browser zero day»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.