BTC $58270.6324
ETH $3301.4664
BNB $400.6794
SOL $110.0515
XRP $0.5824
ADA $0.6271
AVAX $39.6830
DOGE $0.0970
TRX $0.1429
wstETH $3808.1443
DOT $8.3586
LINK $19.1334
WETH $3305.4834
MATIC $1.0428
UNI $11.0186
WBTC $57881.0446
IMX $3.3465
ICP $13.0316
BCH $301.2119
LTC $74.8427
CAKE $3.2026
ETC $28.3635
FIL $7.9610
LEO $4.4139
RNDR $7.4060
KAS $0.1700
HBAR $0.1136
DAI $1.0002
ATOM $11.3163
INJ $41.0291
VET $0.0502
TON $2.1419
OKB $51.8401
STX $3.2222
LDO $3.5190
FDUSD $0.9951
XMR $138.3902
XLM $0.1221
ARB $1.8935
NEAR $3.9358
TIA $16.9317
GRT $0.2829
WEMIX $2.2582
ENS $22.5313
MKR $2167.8555
APEX $2.4646
THETA $1.9298
BTC $58270.6324
ETH $3301.4664
BNB $400.6794
SOL $110.0515
XRP $0.5824
ADA $0.6271
AVAX $39.6830
DOGE $0.0970
TRX $0.1429
wstETH $3808.1443
DOT $8.3586
LINK $19.1334
WETH $3305.4834
MATIC $1.0428
UNI $11.0186
WBTC $57881.0446
IMX $3.3465
ICP $13.0316
BCH $301.2119
LTC $74.8427
CAKE $3.2026
ETC $28.3635
FIL $7.9610
LEO $4.4139
RNDR $7.4060
KAS $0.1700
HBAR $0.1136
DAI $1.0002
ATOM $11.3163
INJ $41.0291
VET $0.0502
TON $2.1419
OKB $51.8401
STX $3.2222
LDO $3.5190
FDUSD $0.9951
XMR $138.3902
XLM $0.1221
ARB $1.8935
NEAR $3.9358
TIA $16.9317
GRT $0.2829
WEMIX $2.2582
ENS $22.5313
MKR $2167.8555
APEX $2.4646
THETA $1.9298
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Over 1600 Docker Hub images contain backdoors


    More than 1,600 public Docker Hub images hide cryptocurrency miners, backdoors, DNS interceptors, and website redirectors.

    Docker Hub is a cloud-based container library that allows developers to search and download Docker images or upload their creations to a public library or personal repositories.

    Researchers at Sysdig have looked into the issue in an attempt to assess the extent of the problem and have reported images found that contain malicious code. Sysdig examined 250,000 unverified Linux images and identified 1,652 of them as malicious.

    In the first place are cryptominers, found in 608 images that used server resources for cryptocurrency mining.

    The second most common occurrence (281 images) was images that embedded “extra information” such as SSH keys, AWS credentials, GitHub tokens, NPM tokens, etc.

    Sysdig notes that this data may have been left in public images by mistake or intentionally entered by an attacker. By embedding an SSH key or an API key in a container, a hacker can gain access to the system after the container is deployed.

    Many malicious images with a built-in cryptominer used the "Typosquatting" technique to impersonate trusted images.

    Sysdig reports that in 2022, 61% of all images pulled from Docker Hub will come from public repositories, up 15% from 2021, so the risk to users is increasing.

    The size of the Docker Hub public library prevents its operators from checking all downloads on a daily basis, so many malicious files go unreported. Moreover, Sysdig noticed that most attackers download a couple of malicious images, so even if one image is removed and the bootloader is banned, this will not have a significant impact on the threat landscape.

    Author DeepWeb
    CISA Warns of Multiple Critical Vulnerabilities in Mitsubishi Electric GX Works3 Engineering Software
    Cybercriminals forced the Vatican to shut down its website

    Comments 0

    Add comment