LWN: Comments on "Backdoored images downloaded 5 million times finally removed from Docker Hub (ars technica)" https://lwn.net/Articles/757576/ This is a special feed containing comments posted to the individual LWN article titled "Backdoored images downloaded 5 million times finally removed from Docker Hub (ars technica)". en-us Fri, 17 Oct 2025 06:16:01 +0000 Fri, 17 Oct 2025 06:16:01 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Backdoored images downloaded 5 million times finally removed from Docker Hub(ars technica) https://lwn.net/Articles/757710/ https://lwn.net/Articles/757710/ valberg <div class="FormattedComment"> <font class="QuotedText">&gt; But then, the malicious images on Dockerhub are not the real problem. With Docker API access you can just point the Docker daemon at your own image registry powered by a CDN of IoT devices or whatever.</font><br> <p> The articles could be more precise. You're right that the images are not the real problem but they are part of the attack. Deleting the account and hence those images would have temporarily stopped the attacks. To be fair, it would have turned into a whack-a-mole as the images could have been uploaded to another account on DockerHub but doing nothing is certainly not the right move to increase or gain trust.<br> </div> Mon, 18 Jun 2018 12:45:11 +0000 Backdoored images downloaded 5 million times finally removed from Docker Hub(ars technica) https://lwn.net/Articles/757630/ https://lwn.net/Articles/757630/ lsl <div class="FormattedComment"> Ok, so apparently the mode of attack is scanning the net for hosts that expose the unauthenticated Docker admin socket to the public internet.<br> <p> <font class="QuotedText">&gt; This got deployed on one of our servers which a faulty firewall setting (Docker API port was exposed accidentally). This means the "creators" of the image are actively scanning the Internet for exposed Docker APIs in order to run this image on them.</font><br> <a href="https://github.com/docker/hub-feedback/issues/1121">https://github.com/docker/hub-feedback/issues/1121</a><br> <p> But then, the malicious images on Dockerhub are not the real problem. With Docker API access you can just point the Docker daemon at your own image registry powered by a CDN of IoT devices or whatever.<br> </div> Fri, 15 Jun 2018 20:27:07 +0000 Backdoored images downloaded 5 million times finally removed from Docker Hub(ars technica) https://lwn.net/Articles/757627/ https://lwn.net/Articles/757627/ lsl <div class="FormattedComment"> What I don't understand is why anyone would start to use the attacker's images in the first place.<br> I think I should create a git repo hosted at <a href="https://github.com/torvalds123321/linux4.git">https://github.com/torvalds123321/linux4.git</a> and wait for people to pull their kernel sources from there.<br> </div> Fri, 15 Jun 2018 20:15:42 +0000