Unknown intruders received access to data of world’s biggest library of images for containers that caused leaking of more than 190 thousands users’ credentials.Docker Hub developers detected that third persons got unauthorized access to one of project databases that stored non-financial users’ details.
“On Thursday, April 25th, 2019, we discovered unauthorized access to a single Hub database storing a subset of non-financial user data,” said Kent Lamb, Director of Docker Support.
As emphasized, intruders stayed in system for a relatively short time, however, according to preliminary research, that was enough to compromise 190 000 accounts that consists nearly 5% of all Docker Hub users’ base.
In the attack were compromised users’ names, passwords’ hashes, and tokens for GitHub and Bitbucket repositories that were used for Docker automatized assemblies.
Mentioned above tokens that are stored in Docker Hub, allow developers to modify codes of their projects and automatically create images on Docker Hub. If intruder will get tokens, it will open him access to private repositories and change it depending on allocated by token permissions. Compromising image and modifying code, hacker will seriously damage supply chain, as Docker Hub images are often used in servers’ and applications configurations.
Docker Hub team notified users and reset passwords of compromised accounts.
“For users with autobuilds that may have been impacted, we have revoked GitHub tokens and access keys, and ask that you reconnect to your repositories and check security logs to see if any unexpected actions have taken place,” Lamb said in the email the company sent customers.
Docker’s team have already withdrawn all compromised tokens and access keys, however, all developers that use automatized Docker Hub constructors, are highly recommended to check all projects for unsanctioned access.
Though hacker’s access to 5% of users’ accounts does not seem to be a critical issue, the spectrum of ramifications may be broad. As majority of Docker Hub users are employees of big companies, they could use their accounts for creation of containers that are later applied in real enterprise environments. After attack, hackers may introduce malware code in IT-systems of large companies worldwide.
Investigation of incident and assessment of possible damage continues.