Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Millions of malicious “imageless” containers have been implanted on Docker Hub for five years
    Cyber Security

    Millions of malicious “imageless” containers have been implanted on Docker Hub for five years

    techempireBy techempire1 Comment3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportApril 30, 2024Editorial DepartmentDocker Hub / Supply Chain Attack

    Dockers Center

    Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub that have planted millions of malicious “imageless” containers over the past five years, once again highlighting how open source registries pave the way for supply chain attacks.

    “More than 4 million repositories in Docker Hub are imageless and contain nothing except the repository files,” JFrog security researcher Andrey Polkovnichenko said in a report shared with The Hacker News.

    More importantly, this file has nothing to do with the container. Instead, it is a webpage designed to lure users to a phishing or malware-hosting website.

    Internet security

    Of the 4.79 million imageless Docker Hub repositories discovered, 3.2 million of them are said to be used as landing pages to redirect unsuspecting users to fraudulent websites as part of three broad campaigns:

    • Downloaders (repositories created in the first half of 2021 and September 2023) that promote purported links to pirated content or video game cheats, but either link directly to malicious sources or to legitimate sources that in turn contain Redirect to malicious payload after 500 milliseconds.
    • The e-book phishing (a repository created in mid-2021) redirects users searching for e-books to a website (“rd.lesac.ru”), which in turn urges them to enter financial information to download the e-book.
    • website (thousands of repositories were created daily from April 2021 to October 2023), which in some cases contained links to an online diary hosting service called Penzu.

    The payload delivered as part of the download campaign is designed to contact a command and control (C2) server and transmit system metadata, which then responds with a link to the cracked software.

    On the other hand, the exact goals of the website cluster are currently unclear, and the campaign also spreads on websites with lax content moderation policies.

    Internet security

    “The most concerning aspect of these three campaigns is that users can’t do much to protect themselves in the first place other than exercising caution,” Shachar Menashe, senior director of security research at JFrog, said in a statement shared with JFrog.

    “We are essentially looking at a malware playground that, in some cases, has been three years in the making. These threat actors are very motivated and hide behind the credibility of the Docker Hub name. Lure the victim.

    As the XZ Utils leak demonstrates, threat actors go to great lengths to poison well-known utilities, so developers must exercise caution when downloading packages from the open source ecosystem.

    “As Murphy’s Law states, if something can be exploited by malware developers, it inevitably will be exploited, so we expect these campaigns to be found in more repositories than just It’s Docker Hub,” Menashe said.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.