Hacker News new | past | comments | ask | show | jobs | submit login

In what sense is this a “backdoor”? Seems to me the code is coming through the front door, which the victims left open.

DockerHub is just the delivery mechanism.




I'm scratching my head at where the /mnt mount is coming from. If you're doing "docker run -v /:/mnt <sketchy_username>/mysql" then absolutely nobody can help you.


Same for me.

From Kromtech's article I deduced that this only happens when a docker daemon (or kubernetes interface) is exposed to the Internet and an attacker uses that to download and start a docker image on the victim's host. Then they can bind mount a host directory like described and attack the host computer.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: