Ethical Hacking News
Researchers have uncovered a backdoor in dozens of Docker Hub images containing the infamous XZ Utils malware. The incident highlights ongoing supply chain risks and underscores the need for continuous monitoring beyond simple version tracking.
Docker Hub images contain a backdoor in dozens of images, exposing supply chain risks.A total of 35 Docker images were found to have the infamous XZ Utils backdoor (CVE-2024-3094).The incident highlights the ongoing vulnerabilities present in the software supply chain and the importance of continuous monitoring beyond simple version tracking.Compromised intermediate layers can propagate the infection, even if an attacker doesn't directly exploit the vulnerability.A developer with "meticulous" planning was involved in creating the backdoor, suggesting a state-sponsored operation.Leaving publicly available Docker images with potential network-reachable backdoors poses a significant security risk.The incident emphasizes the need for continuous binary-level monitoring beyond simple version tracking to detect vulnerabilities before they can be exploited.
In a recent discovery by Binarly, researchers have uncovered a backdoor in dozens of Docker Hub images that could potentially expose supply chain risks. The finding is particularly concerning given the widespread use of Docker Hub images in various industries and applications.
According to the research report shared with The Hacker News, a total of 35 Docker images were found to contain the infamous XZ Utils backdoor. This incident highlights the ongoing vulnerabilities present in the software supply chain and underscores the importance of continuous monitoring beyond simple version tracking.
The discovery is especially notable given that other images have been built on top of these infected base images, effectively propagating the infection further in a transitive manner. This means that even if an attacker does not directly exploit the vulnerability, they can still use compromised intermediate layers to reach their target application.
The XZ Utils supply chain event (CVE-2024-3094, CVSS score: 10.0) was first reported in late March 2024, when Andres Freund sounded the alarm on a backdoor embedded within XZ Utils versions 5.6.0 and 5.6.1. Further analysis of the malicious code revealed that the backdoor could lead to unauthorized remote access and enable the execution of arbitrary payloads through SSH.
The second finding was that the changes were pushed by a developer named "Jia Tan" (JiaT75), who spent almost two years contributing to the open-source project to build trust until they were given maintainer responsibilities, signaling the meticulous nature of the attack. Binarly described this as "a very complex state-sponsored operation with impressive sophistication and multi-year planning."
The company pointed out that leaving publicly available Docker images that contain a potential network-reachable backdoor carries a significant security risk, despite the criteria required for successful exploitation – the need for network access to the infected device with the SSH service running.
"The xz-utils backdoor incident demonstrates that even short-lived malicious code can remain unnoticed in official container images for a long time, and that can propagate in the Docker ecosystem," it added. "This delay underscores how these artifacts may silently persist and propagate through CI pipelines and container ecosystems, reinforcing the critical need for continuous binary-level monitoring beyond simple version tracking."
The incident highlights the ongoing risks faced by organizations relying on open-source software and Docker images. It serves as a reminder of the importance of staying vigilant and up-to-date with security patches, as well as the need for continuous monitoring to detect potential vulnerabilities before they can be exploited.
In response to the discovery, Binarly reported the base images to the Debian maintainers, who acknowledged that they had "made an intentional choice to leave these artifacts available as a historical curiosity." However, this stance raises questions about the responsibility of organizations and developers to ensure the security of their contributions to open-source projects.
The incident will undoubtedly spark further debate about the importance of binary-level monitoring in ensuring the security of container images. As the use of Docker Hub images continues to grow, it is essential that organizations prioritize continuous monitoring and patching to prevent similar incidents from occurring.
Related Information:
https://www.ethicalhackingnews.com/articles/New-Vulnerability-in-Docker-Hub-Images-Exposes-Supply-Chain-Risks-ehn.shtml
https://thehackernews.com/2025/08/researchers-spot-xz-utils-backdoor-in.html
https://www.bleepingcomputer.com/news/security/docker-hub-still-hosts-dozens-of-linux-images-with-the-xz-backdoor/
https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/
Published: Tue Aug 12 14:27:09 2025 by llama3.2 3B Q4_K_M