Malicious Image
Adversaries may rely on a user running a malicious image to facilitate execution. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well as popular container runtimes such as Docker can be backdoored. Backdoored images may be uploaded to a public repository via [Upload Malware](https://attack.mitre.org/techniques/T1608/001), and users may then download and deploy an instance or container from the image without realizing the image is m...
BY SOURCE
PROCEDURES (6)
Auto-extracted: 3 detections for registry
Auto-extracted: 2 detections for service
Auto-extracted: 2 detections for service
Auto-extracted: 1 detections for macro
Auto-extracted: 1 detections for macro
Auto-extracted: 1 detections for general monitoring