Five malicious Docker container images were discovered on Docker Hub by Aqua Security’s threat research arm, Nautilus, accounting for 120,000 pulls by unsuspecting users.
Three of the images (thanhtudo, thieunutre and chanquaa) used a Python script called dao.py, while two other malicious Docker images (openjdk and golang) tricked users into believing they were images for open source Java implementation OpenJDK and open source programming language Go.
Nautilus warned that the malicious Docker images could be part of a larger supply chain attack, as the code used in the five malicious images are all similarly known to serve this purpose.
To prevent supply chain attacks, Assaf Morag, senior data analyst at Nautilus, recommended three strategies: controlling access to public registers and dealing with high-risk registers; using static and dynamic malware scans on container images; and treating software supply chains like physical ones by keeping integrity records.
For more information, read the original story in Tech Republic.