Researchers Warn Users Of Docker Container Images Threat

Share post:

Five malicious Docker container images were discovered on Docker Hub by Aqua Security’s threat research arm, Nautilus, accounting for 120,000 pulls by unsuspecting users.

Three of the images (thanhtudo, thieunutre and chanquaa) used a Python script called dao.py, while two other malicious Docker images (openjdk and golang) tricked users into believing they were images for open source Java implementation OpenJDK and open source programming language Go.

Nautilus warned that the malicious Docker images could be part of a larger supply chain attack, as the code used in the five malicious images are all similarly known to serve this purpose.

To prevent supply chain attacks, Assaf Morag, senior data analyst at Nautilus, recommended three strategies: controlling access to public registers and dealing with high-risk registers; using static and dynamic malware scans on container images; and treating software supply chains like physical ones by keeping integrity records.

For more information, read the original story in Tech Republic.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Cyber Security Today, April 12, 2024 – A warning to Sisense customers, a new tactic for spreading the Raspberry Robin worm, and more

A warning to Sisense customers, a new tactic for spreading the Raspberry Robin worm, and more. Welcome to Cyber Security Today. It’s Friday April 12th, 2024. I’m Howard Solomon. Organizations that use products from business analytics provider Sisense [SI-SENSE] are being told to reset user login credentials and digital keys. The warning comes from the

LinkedIn introduces verification for recruiters to combat scams

LinkedIn announced today the launch of a new verification process for job recruiters, a move aimed at curtailing...

Cyber Security Today, Week in Review for week ending Friday, April 5, 2024

This episode features a discussion on a highly critical report on the hacking of Microsoft Exchange Online email accounts, a case study of a ransomware attack and the discovery of a years-long infiltration of an open source group to insert a backdoor

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways