Docker Hub, the world’s largest library and community for container images, informed users last week that it had discovered unauthorized access to one of its databases.
Docker said the breach was discovered on April 25 and the compromised database stored non-financial data belonging to roughly 190,000 accounts, which represents less than 5 percent of Docker Hub users.
The exposed data includes usernames and password hashes for a small percentage of impacted users, along with Bitbucket and GitHub tokens for Docker autobuilds.
Users whose password hashes were exposed had their passwords reset and a password reset link was sent to them via email. GitHub and Bitbucket tokens and access keys have been revoked and repositories have been unlinked — users will need to reconnect their repositories and they have been advised to check security logs for any suspicious activities.
“Revoking the tokens was done as soon as possible to protect users. At that point in time we were working on additional measures to secure the site. Once completed, communications were sent to all potentially impacted users,” Docker said.
Docker said the incident did not impact any official images and the company has rolled out additional security measures to ensure their integrity.
Last year, the Kromtech Security Center reported that it had found 17 malicious docker images that had been stored on Docker Hub for an entire year and Docker was slow to respond to notifications from security researchers.