Hackers kregen toegang tot 190 duizenden Docker Hub accounts

Unknown intruders received access to data of world’s biggest library of images for containers that caused leaking of more than 190 thousands users’ credentials.

Docker Hub developers detected that third persons got unauthorized access to one of project databases that stored non-financial users’ details.

On Thursday, April 25th, 2019, we discovered unauthorized access to a single Hub database storing a subset of non-financial user data,” zei Kent Lamb, Director of Docker Support.

As emphasized, intruders stayed in system for a relatively short time, Echter, according to preliminary research, that was enough to compromise 190 000 accounts that consists nearly 5% of all Docker Hub users’ base.

In the attack were compromised users’ names, passwords’ hashes, and tokens for GitHub and Bitbucket repositories that were used for Docker automatized assemblies.

Mentioned above tokens that are stored in Docker Hub, allow developers to modify codes of their projects and automatically create images on Docker Hub. If intruder will get tokens, it will open him access to private repositories and change it depending on allocated by token permissions. Compromising image and modifying code, hacker will seriously damage supply chain, as Docker Hub images are often used in servers’ and applications configurations.

Docker Hub team notified users and reset passwords of compromised accounts.

For users with autobuilds that may have been impacted, we have revoked GitHub tokens and access keys, and ask that you reconnect to your repositories and check security logs to see if any unexpected actions have taken place,” Lamb said in the email the company sent customers.

Docker’s team have already withdrawn all compromised tokens and access keys, Echter, all developers that use automatized Docker Hub constructors, are highly recommended to check all projects for unsanctioned access.

Mail from Docker Hub
Experts are sharing on the Internet a letter from Docker Hub

Though hacker’s access to 5% of users’ accounts does not seem to be a critical issue, the spectrum of ramifications may be broad. As majority of Docker Hub users are employees of big companies, they could use their accounts for creation of containers that are later applied in real enterprise environments. After attack, hackers may introduce malware code in IT-systems of large companies worldwide.

Investigation of incident and assessment of possible damage continues.

Bron: https://www.zdnet.com

Over Trojan Killer

Carry Trojan Killer Portable op je memory stick. Zorg ervoor dat u in staat om uw pc te weerstaan ​​elke cyberdreigingen overal mee naar toe bent.

Controleer ook

MageCart op de Heroku Cloud Platform

Onderzoekers vonden verschillende MageCart Web Skimmers Op Heroku Cloud Platform

Onderzoekers van Malwarebytes rapporteerde over het vinden van een aantal MageCart web skimmers op de Heroku cloud-platform …

Android Spyware CallerSpy

CallerSpy spyware maskers als een Android-chat-applicatie

Trend Micro deskundigen ontdekte de malware CallerSpy, waarachter een Android chat-toepassing en, …

Laat een antwoord achter