CrowdStrike security researchers discovered two Docker images with over 150,000 downloads that were used to launch distributed denial-of-service (DDoS) attacks on a dozen Russian and Belarusian websites operated by government, military, and press organisations from February to March 2022. CrowdStrike discovered that two malicious images named "Erikmnkl/stoppropaganda" and "Abagayev/stop-Russia" retrieved directly from the Docker Hub repository attacked its honeypots via exposed Docker Engine APIs. Initially, the targets for the DDoS attacks were chosen at random, but subsequent versions of the images included a time-based selection and a hardcoded list of targets that were targeted in one-hour strikes. The Docker images contains bombardier, a Go-based HTTP benchmarking tool for stress-testing websites using HTTP-based queries that was abused as a DoS tool when a new container based on the Docker image was created. Targeting unprotected Docker APIs is nothing new; cryptocurrency mining gangs such as Lemon Duck and TeamTNT have been targeting exposed Docker APIs for years. Unfortunately, there are many poorly configured or poorly protected Docker deployments out there, making it simple for threat actors to exploit the resources.
A researcher scheduled to demonstrate a $1 million zero-click remote code execution (RCE) exploit against WhatsApp at Pwn2Own Ireland 2025 withdrew the public demo and instead priv...
Famous Chollima, a DPRK-aligned threat cluster, has been consolidating its infostealers—melding BeaverTail and OtterCookie capabilities—to harvest credentials and cryptocurrenc...
Qilin, also known as Agenda, Gold Feather, and Water Galura, has become one of the most active ransomware-as-a-service (RaaS) groups in 2025, claiming over 40 victims monthly since...