General Container Threats
Application-level DDOS and XSS against public-facing containers.
Compromised containers trying to ‘phone home to download malware.
Compromised containers try to scan other internal systems to find other weaknesses or search for sensitive data.
Container breakout and unauthorised access across containers, hosts, or data centers.
Container resource hogging, eating up CPU/Mem/Disk/IO to impact or even crash other containers.
Live to patch applications that bring in malicious processes from a hijacked DNS or another service.
Network flooding from poorly designed applications impacts other containers.
Container Attacks – Examples
SQL injection attacks gaining ownership of a database container to start stealing data.
The shell-shock bash bug allows remote attackers to execute arbitrary code inside a container.
The heart-bleed bug caused the container’s memory to be leaked and analyzed.
The Glibc stack-based buffer overflow is caused by a man-in-the-middle attack.
New zero-day attack on a container causing a persistent threat
Top comments (0)