AN aqua Security analysis of 105 victims of malicious container images found that 36 per cent had multiple vulnerabilities and misconfigurations that could be employed to expand the blast radius of a cyberattack, reports Florida's Container Journal.
A total of 70 per cent of victims exhibited potential for credential theft that could occur if cybercriminals escalates privileges once they gained access.
On the plus side, the report also found that a few weeks after the initial scan, 50 per cent of them with vulnerabilities had remediated all vulnerabilities and misconfigurations, while another 12 per cent had fixed some but not all, while 25 per cent did nothing.
Aqua Security analyst Asaf Morag said there are many organisations that have yet to address the issue.
He said there is tendency among many developers and IT teams to assume containers are secure because they are ripped and replaced so often. However, cybercriminals are now regularly stealing credentials so they can deploy containers on systems that they use to surreptitiously mine for cryptocurrencies, also known as cryptojacking.
In all 105 cases, cybercriminals took advantage of a misconfigured Docker application programming interface (API) to run a malicious container image.
SeaNews Turkey
A total of 70 per cent of victims exhibited potential for credential theft that could occur if cybercriminals escalates privileges once they gained access.
On the plus side, the report also found that a few weeks after the initial scan, 50 per cent of them with vulnerabilities had remediated all vulnerabilities and misconfigurations, while another 12 per cent had fixed some but not all, while 25 per cent did nothing.
Aqua Security analyst Asaf Morag said there are many organisations that have yet to address the issue.
He said there is tendency among many developers and IT teams to assume containers are secure because they are ripped and replaced so often. However, cybercriminals are now regularly stealing credentials so they can deploy containers on systems that they use to surreptitiously mine for cryptocurrencies, also known as cryptojacking.
In all 105 cases, cybercriminals took advantage of a misconfigured Docker application programming interface (API) to run a malicious container image.
SeaNews Turkey