TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Analysis on Docker Hub malicious images: Attacks through public container images

70 pointsby e-Minguezover 2 years ago

9 comments

Doubleslashover 2 years ago
The segmentation into attack vectors is interesting. But images from individuals on something like DockerHub have always been untrusted. I expected to read here about recent compromised official DockerHub library images.<p>I don&#x27;t see how that threat is new or now more pressing than ever. How would you even count something like `docker pull vesnpsexga&#x2F;joomla` as typosquatting vs. `docker pull joomla`? It&#x27;s not even close.<p>Users should limit there container runtime&#x2F;podman&#x2F;docker access to docker.io&#x2F;library or use a pull-thru caching feature of their own registry to bring in stuff from hand-selected places in public registries like docker.io or quay.io to environments behind the firewall.
评论 #33723784 未加载
评论 #33731246 未加载
coffeeblackover 2 years ago
Does every “registry” or “hub” have to repeat the same mistakes? It’s not like the same didn’t happened on pypi, npm, crates, and who knows how many others.
评论 #33722902 未加载
hermanbover 2 years ago
Honestly, this seems like little. We should be wary of the source we try to pull, but given how easy it is to upload something malicious you’d expect thousands of images of this kind. Maybe DockerHub is already detecting and deleting these packages?<p>Or why aren’t more people interested in this?<p>Not sure, but maybe injecting into commonly used libraries via subdependencies is seen as a more effective method, getting more focus. Would be interesting to have a broader analysis of malicious artifacts!
kjokover 2 years ago
Given that these malicious images seem esoteric (only a few hundred downloads), is this even a threat? Most companies have private mirrors that protect against such attacks.
评论 #33723553 未加载
Yerocover 2 years ago
This sounds like much-ado about nothing. We probably need to be far more concerned about &quot;Docker Official Image&quot;s that have been deprecated and are no longer receiving updates such as the &quot;official&quot; &#x2F;_centos images (including centos7 which in theory isn&#x27;t EOL but RedHat apparently doesn&#x27;t care).
评论 #33726245 未加载
egberts1over 2 years ago
A couple hundred downloads?<p>These kinds of repository are probably best used by drive-by malware.<p>I think this (and all) repository&#x27;s download log should be made open, or at least made viewable prior to your downloading step as part of the trust profiling.
exabrialover 2 years ago
Don&#x27;t use Docker. Use <i>heavy sigh</i> systemd security features. Yes, this is something that systemd actually does really well. And it keeps all your processes and files visible and inspectable to standard unix tools (ps, htop, ls, etc).<p>* chroot * cgroups * PrivateNetwork * PrivateTmp * isolated devices * IPAddressAllow * SocketBindAllow * ReadOnlyPaths<p><a href="https:&#x2F;&#x2F;docs.arbitrary.ch&#x2F;security&#x2F;systemd.html" rel="nofollow">https:&#x2F;&#x2F;docs.arbitrary.ch&#x2F;security&#x2F;systemd.html</a>
评论 #33727409 未加载
TekMolover 2 years ago
With Docker, how well is the host protected from malicious images?
评论 #33724445 未加载
评论 #33722316 未加载
评论 #33725730 未加载
naikrovekover 2 years ago
this is all trending to a point where the number available libraries for an ecosystem will be seen as a liability rather than an asset.