UPDATED 08:00 EDT / JUNE 21 2021

SECURITY

Research finds container infrastructure can be exploited in under one hour

Cloud-native security startup Aqua Security Software Ltd. today published new research revealing that it can now take less than an hour for vulnerable software container infrastructure to be exploited.

The report, coming amid a continued rise in cyberattacks targeting container infrastructure, details how bad actors are getting better at hiding their increasingly sophisticated attacks. These involve packing of payloads, running malware straight from memory and using rootkits.

The use of botnets continues to rise and they were found to be swiftly finding and infecting new hosts as they become vulnerable. Notably, 50% of new misconfigured Docker container application programming interfaces are attacked by botnets within 56 minutes of being set up. Containers are software that hosts the elements of modern software in a way that they can be used across multiple kinds of computer systems.

Cryptocurrency mining was found to be the most common objective in most attacks, with more than 90% of the malicious images executing resource hijacking script, while 40% of attacks involved creating backdoors on the host. On the latter, adversaries were dropping dedicated malware, creating new users with root privileges and creating SSH keys for remote access.

The report also uncovered a massive campaign targeting the auto-build of software-as-a-service development environments among new attack techniques being used by adversaries. “This has not been a common attack vector in the past, but that will likely change in 2021 because the deployment of detection, prevention and security tools designed to protect the build process during CI/CD flow is still limited within most organizations,” explained Assaf Morag, lead data analyst with Aqua’s Team Nautilus

The results of this report were contributed as input into MITRE’s creation of its new MITRE ATT&CK Container Framework. MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

“The threat landscape has morphed as malicious adversaries extend their arsenals with new and advanced techniques to avoid detection,” Morag added. “At the same time, we’re also seeing that attacks are now demonstrating more sinister motives with greater potential impact.”

Aqua Security was last in the news in March when it raised $135 million in late-stage funding. The round gave the company unicorn status for the first time with a valuation north of $1 billion.

Image: Aqua Security

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU