Welcome back to this week's security bulletin!

Most of us are familiar with Docker, and it's gaining popularity in the IT industry. Docker is an open platform for developing, running, and shipping applications. Docker helps to separate applications from its infrastructure by using containers. A Docker image is a multi-layered file used to execute code in a Docker container. You can share the images with other people using Docker hub so that their Docker virtual machine will run the same as yours.

The latest reports say that malicious actors using Docker's popularity by distributing Docker Images Contains Cryptojacking Malware and make money. Researchers said, "we identified a malicious Docker Hub account, azurenql, active since October 2019 that hosted six malicious images to mine the cryptocurrency, Monero. The coin mining code in the image intends to evade network detection using network anonymizing tools such as Tor and ProxyChains. More than two million times, the images hosted on this account have been collectively pulled. There are legitimate Azure related images under the official Microsoft Docker Hub account that have anywhere from a few thousand to 100 million+ pulls. One of the wallet IDs identified has been used to earn more than 525.38 XMR, which roughly translates to "$36,000".

The malicious actors distribute their images to any machine that supports Docker and instantly starts using the compute resources towards cryptojacking. Therefore, users need to avoid pulling or using base images from untrusted repositories.


Have you heard about Steganography? It's a technique of hiding secret data within an ordinary, non-secret file, or message to avoid detection. Hackers use this technique to steal credit card information by inserting malicious code to the metadata of an image in a compromised online store.

Last week the Malwarebytes researchers informed, "We found skimming code hidden within the metadata of an image file (a form of steganography) and surreptitiously loaded by compromised online stores."

"This scheme would not be complete without another interesting variation to exfiltrate stolen credit card data. Once again, criminals used the disguise of an image file to collect their loot."

They found an image, as shown above. The metadata of an image on the website contains hidden javascript, which is responsible for grabbing the content of the input fields where online shoppers are entering their name, billing address, and credit card details.

It's time to use trusted stores, and please avoid purchasing via random shopping sites found on the Internet.


Time to reveal happy news to Apple customers!

New privacy features are added to the upcoming Apple iOS 14 and macOS Big Sur systems, which provide better control over data that can be accessed by apps, spot spy apps, and identify malicious applications.

Here is the list of main privacy features:

  1. The latest iOS version allows you to share the approximate location with apps you are using instead of giving precise geolocation coordinates access when granting any app location access.
  2. Now iPhone users will see a yellow dot indicator in the status bar whenever their microphone or camera is recording.
  3. Users can upgrade their existing app accounts to Sign in with Apple for better privacy and security
  4. You need not share the entire photo library to the app. Instead, you can provide access to selected items.
  5. Safari will detect if you are using a compromised password for an online account.
  6. You can choose which apps have permission to track you.
  7. Developers need to display privacy information of their apps on the app store.
  8. Switching from Intel processors to its in-house "Apple Silicon" processors.