CrowdStrike security researchers discovered two Docker images with over 150,000 downloads that were used to launch distributed denial-of-service (DDoS) attacks on a dozen Russian and Belarusian websites operated by government, military, and press organisations from February to March 2022. CrowdStrike discovered that two malicious images named "Erikmnkl/stoppropaganda" and "Abagayev/stop-Russia" retrieved directly from the Docker Hub repository attacked its honeypots via exposed Docker Engine APIs. Initially, the targets for the DDoS attacks were chosen at random, but subsequent versions of the images included a time-based selection and a hardcoded list of targets that were targeted in one-hour strikes. The Docker images contains bombardier, a Go-based HTTP benchmarking tool for stress-testing websites using HTTP-based queries that was abused as a DoS tool when a new container based on the Docker image was created. Targeting unprotected Docker APIs is nothing new; cryptocurrency mining gangs such as Lemon Duck and TeamTNT have been targeting exposed Docker APIs for years. Unfortunately, there are many poorly configured or poorly protected Docker deployments out there, making it simple for threat actors to exploit the resources.
As per sources a major security flaw has been found in the Model Context Protocol (MCP), a standard introduced by Anthropic in 2024 to help generative AI tools like Claude 3.7 Sonn...
A new ransomware strain dubbed “Ghost” (also known as Cring) has escalated into a significant global threat. First identified in 2021, it has recently resurged with alarming in...
A serious security issue has been identified in SonicWall's SMA100 series appliances, prompting a critical alert from the Cybersecurity and Infrastructure Security Agency (CISA...