Hackers abuse container technology to carry out supply chain attacks

Cyber ​​criminals have started using malicious container images as an installation means crypto miners on corporate networks, although they can also be used as part of a attack on the supply chain focused on cloud-native environments.

The Cyber ​​Security Company Aqua Security discovered several supply chain attacks that use malicious container images to compromise their victims when Team Nautilus, the threat research team, ran Docker Hub’s daily scan for malicious activity according to a new blog post.

Leave a Comment