Home News Docker Hub Image that Downloaded Over 20 Million Times

    Docker Hub Image that Downloaded Over 20 Million Times

    13
    0


    Cryptominers in Docker Hub Image

    Malicious Docker Hub containers infect 20 million with cryptomining malware. Aviv Sasson, a part of the Palo Alto Networks menace intelligence workforce, Unit 42, found 30 malicious photographs with a complete variety of 20 million pulls (the photographs have been downloaded 20 million occasions), collectively accounting for cryptojacking operations price US$200,000.

    Docker Hub is the most important library of container functions, permitting firms to share photographs internally or with their prospects, or the developer neighborhood to distribute open-source tasks.

    Malicious Cryptojacking Photographs

    The cloud is standard for cryptojacking assaults resulting from two fundamental causes:

    • The cloud consists of many cases for every goal (e.g. plenty of CPUs, plenty of containers, plenty of digital machines), which may translate to large mining income.
    • The cloud is difficult to watch. Miners can run undetected for a very long time, and with none detection mechanisms in place, they might run till the person finds an inflated cloud utilization invoice and realizes that one thing is mistaken.

    Trendy cloud know-how is especially based mostly on containers, and in some environments, Docker Hub is the default container registry. Attackers can benefit from it to deploy miners on compromised clouds.

    The researcher discovered 30 photographs from 10 completely different Docker Hub accounts that account for over 20 million pulls. It’s potential to examine what number of cryptocurrencies have been mined to a mining pool account by inspecting the mining pool.

    The preferred cryptocurrency for attackers to mine is Monero. Attackers favor Monero for 3 causes:

    • Monero supplies most anonymity. Monero transitions are hidden. This privateness is ideal for cybercriminals as a result of it means their exercise is hidden.
    • The Monero mining algorithm favors CPU mining, in contrast to many different cryptos that require ASICs or GPU for mining. That is handy as a result of all computer systems have CPUs. Thus, the miner can run successfully on any machine. That is much more appropriate for containers, of which the overwhelming majority run with no GPU.
    • Monero is a well-liked coin, and its alternate quantity is round US$100 million a day, making it straightforward for the attackers to promote their cash.
    Cryptominer Distribution

    In most assaults that mine Monero, the attackers used XMRig. XMRig is a well-liked Monero miner and is most well-liked by attackers as a result of it’s straightforward to make use of, environment friendly and, most significantly, open-source. Therefore, attackers can modify their code.

    Cryptominer Distribution

    Picture Tags

    Wanting on the picture tags, which reference completely different variations, Sasson found that in some circumstances there are completely different tags for varied processor architectures or working methods.

    “It looks like some attackers are versatile and add these tags to suit a broad vary of potential victims that features a variety of working methods (OS) and CPU architectures.”, Aviv Sasson.

    Safety from these Threats

    Palo Alto Networks Prisma Cloud prospects are protected against these threats by means of the Cryptominers Runtime Detection characteristic and the Trusted Photographs characteristic. Additionally, Palo Alto Networks Subsequent-Technology Firewall prospects with the Menace Prevention safety subscription are protected towards the supply of those photographs.

    You possibly can observe us on LinkedinTwitterFacebook for every day Cybersecurity and hacking information updates.

    Prompt Learn

    Flan Scan – Cloudflare Released New Network Vulnerability Scanner Tool Based on Nmap

    MobiKwik Data Breach – Hackers Selling Over 8TB of Users Personal and Financial Data





    Source link