Vulnerabilities

ATTACK USES DOCKER CONTAINERS TO HIDE, PERSIST, PLANT MALWARE

LAS VEGAS—A novel attack vector allows for adversaries to abuse the Docker API to hide malware on targeted systems, and even execute remote code.

The proof of concept attack was developed by researchers at Aqua Security, and the technique was first demonstrated today at Black Hat by Sagie Dulce, senior security researcher, with Aqua Security.

To Top

Pin It on Pinterest

Share This