Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

05:25 PM

Malicious or Vulnerable Docker Images Widespread, Firm Says

A dynamic analysis of the publicly available images on Docker Hub found that 51% had critical vulnerabilities and about 6,500 of the 4 million latest images could be considered malicious.

More than half of the latest images available on Docker Hub have critical vulnerabilities from outdated software, while thousands of images are attack tools or other potentially dangerous software, according to an analysis of 4 million images published on Dec. 1 by Prevasio, a security startup.

Among the most serious threats published to Docker Hub as images are more than 6,400 cryptominers, malicious JavaScript packages, hacking tools, and Windows malware. Only one-fifth of the 4 million images tested by the firm had no disclosed vulnerabilities, while 51% had at least one critical vulnerability and 13% had at least on high-severity vulnerability.

Related Content:

Researchers Scan for Supply-Side Threats in Open Source

The Changing Face of Threat Intelligence

New on The Edge: 5 Signs Someone Might be Taking Advantage of Your Security Goodness

Companies should consider Docker containers as part of their supply chain that needs protecting, says Rony Moshkovich, CEO and co-founder of Prevasio.

"Every month there is some bad guy upping their game and utilizing more containers as part of their attack," he says. "We expect it to be more prevalent, because it is very easy to use a Docker container to trick a target into building the attack tools inside their own network."

The software supply chain has become a greater focus of security efforts, as attackers have begun to exploit weaknesses to slip malicious software past perimeter security and onto employees' computers.

In April, researchers at ReversingLabs found that attackers had polluted the RubyGem repository with more than 760 malicious packages that had names similar to legitimate libraries for the Ruby programming language. The variant of "typosquatting" attempts to capitalize on typing mistakes by developers.

In another case in 2018, an attacker gained access to the code of event-stream, a popular JavaScript package hosted on the Node Package Manager (NPM) repository, and added malicious Bitcoin-stealing functionality. The malicious code went undetected for about two months.

Docker containers are often home for outdated — and vulnerable — software. In a paper released in October, researchers found that the containers used for medical imaging analysis had an average of 320 vulnerabilities, with 20% having at least one high-risk vulnerability.

The business world is usually not much better, Alex Eckelberry, a security expert and adviser to Prevasio, said in a statement. "Docker adoption has become a standard for enterprise-class complex applications in the corporate world, with the majority of large enterprises implementing Docker containers in some form," he said. "With containerization now ubiquitous, the attack surface has increased exponentially, and the results of this analysis should be of concern to any enterprise customer."

Prevasio used a dynamic sandbox system to download and build images into Docker containers and then run the containers to detect vulnerabilities and malicious behavior. The company downloaded all the images hosted on Docker Hub, which currently boasts almost 4.3 million, images, focusing on the latest version of each image.

The effort took 800 virtual hosts nearly a month running in parallel, the company said.

About 10% of the images didn't have tags and could not be downloaded, so they were excluded from the analysis. A total of 6,433 images, about 0.16% of Docker Hub, had some malicious or suspicious behavior identified by the open source scanner ClamAV, with hundreds of images manually verified to exclude false positives, the company stated in its report.

"We have covered a lot of malicious images that, under static analysis, do not have malware — instead, [they download] malicious code at runtime," says Sergei Shevchenko, CTO and co-founder of Prevasio. "The only way to catch these dynamic threats is to do runtime analysis and dynamic testing."

The scanning effort is not without precedent. Software composition analysis companies regularly scan repositories, such as the Node Package Manager (NPM) for Node.js JavaScript applications, the Python Package Index (PyPI) for the Python programming language, and RubyGems for Ruby applications. And vulnerability scanning service Snyk has partnered with Docker to regularly scan images for known vulnerabilities.

A number of research project have also tackled the problem. While Python, for example, has been targeted by attackers in the past, a recent scan of the Sync PyPI repository, for example, only found three potentially malicious packages. Snyk and another company, xs:code, have teamed up to create a browser plugin to identify vulnerable open source projects to developers.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-14
An HTTP Request Smuggling vulnerability in Pulse Secure Virtual Traffic Manager before 21.1 could allow an attacker to smuggle an HTTP request through an HTTP/2 Header. This vulnerability is resolved in 21.1, 20.3R1, 20.2R1, 20.1R2, 19.2R4, and 18.2R3.
PUBLISHED: 2021-05-14
Hexagon G!nius Auskunftsportal before allows SQL injection via the GiPWorkflow/Service/DownloadPublicFile id parameter.
PUBLISHED: 2021-05-13
Piwigo 11.4.0 allows admin/user_list_backend.php order[0][dir] SQL Injection.
PUBLISHED: 2021-05-13
The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the ca...
PUBLISHED: 2021-05-13
Bitcoin Core 0.12.0 through 0.21.1 does not properly implement the replacement policy specified in BIP125, which makes it easier for attackers to trigger a loss of funds, or a denial of service attack against downstream projects such as Lightning network nodes. An unconfirmed child transaction with ...