Docker APIs under attack once again null


Cybercriminals have launched attacks against Docker APIs in the past but now they’re building and running malicious container images on the host according to a new report from Aqua’s Nautilus Team.
In a blog post detailing the discovery, lead data analyst at Aqua Security, Assaf Morag explained that this is the first time the firm has observed attackers building their own images as opposed to using ones from a public registry, saying:
“The attacker exploits a misconfigured Docker API port in order to build and run a malicious container image on the host. As far as we know, this is the first time that an attack in which the attacker builds an image rather than pulling it from a public registry is observed in the wild.”
The researchers set up a honeypot that was able to capture the attack in real time and they used these recordings to analyze it afterward.
Building images directly on a targeted host
What sets this recent attack against Docker APIs apart from previous ones is the fact that the “the attacker did not pull an image from a remote source” but instead chose to build the image directly on the targeted host in an effort to bypass defense mechanisms. This also allows the attacker to increase the persistency of their infrastructure by building it directly on the host.
This new tactic is quite concerning as it prevents hosts from reporting malicious images to Docker Hub or other public registries. Aqua and others companies like it scan these registries frequently in order to find and collect malicious images used by hackers.
According to Morag’s blog post, the image built directly on the host was used to execute a resource hijacking attack by using a cryptominer and cryptomining is the currently the most popular attack method used for containers.
Although this new tactic does require a bit more work, it is not too technically complex and can be carried out by less skilled hackers.
Via TechTarget
Cybercriminals have launched attacks against Docker APIs in the past but now they’re building and running malicious container images on the host according to a new report from Aqua’s Nautilus Team. In a blog post detailing the discovery, lead data analyst at Aqua Security, Assaf Morag explained that this is…
Recent Posts
- How Claude’s 3.7’s new ‘extended’ thinking compares to ChatGPT o1’s reasoning
- ‘We’re nowhere near done with Framework Laptop 16’ says Framework CEO
- Razer’s new Blade 18 offers Nvidia RTX 50-series GPUs and a dual mode display
- I tried adding audio to videos in Dream Machine, and Sora’s silence sounds deafening in comparison
- Sandisk quietly introduced an 8TB version of its popular portable SSD, and I just hope they solved its previous big data corruption issue
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010