Malicious KICS Docker Images and VS Code Extensions Hijack Checkmarx Supply Chain
The Hacker News reports a critical software supply chain attack targeting Checkmarx’s KICS (Key Infrastructure as Code Security) product. Malicious images were pushed to the official “checkmarx/kics” Docker Hub repository. Threat actors reportedly overwrote existing tags, including v2.1.20 and alpine, and introduced a rogue v2.1.21 tag that does not correspond to any legitimate release. This indicates a compromise of Checkmarx’s Docker Hub account or their CI/CD pipeline.
This incident extends beyond Docker images, with The Hacker News also highlighting malicious VS Code extensions. This dual-pronged attack vector demonstrates a sophisticated approach to poisoning development environments and build processes. Developers pulling these compromised images or installing the malicious extensions would unknowingly integrate backdoors or data exfiltration capabilities directly into their projects, potentially leading to widespread compromise across their organizations.
For defenders, this is a stark reminder that even trusted software supply chains are under constant assault. The attacker’s calculus here is clear: compromise a widely used security tool to gain a foothold in hundreds, if not thousands, of downstream development environments. This isn’t just about a single vulnerability; it’s about subverting the very tools meant to secure our code.
What This Means For You
- If your organization uses Checkmarx KICS Docker images or related VS Code extensions, you must immediately audit your build environments and developer workstations. Verify the integrity of all `checkmarx/kics` Docker images against official Checkmarx checksums. Revoke any API keys or credentials exposed to potentially compromised build systems. This isn't a drill; malicious code could already be embedded in your software artifacts.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Malicious KICS Docker Image Pull
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| Checkmarx-KICS-SupplyChain | Supply Chain Attack | Malicious Docker images in 'checkmarx/kics' Docker Hub repository |
| Checkmarx-KICS-SupplyChain | Supply Chain Attack | Overwritten Docker image tags: v2.1.20, alpine |
| Checkmarx-KICS-SupplyChain | Supply Chain Attack | New unofficial Docker image tag: v2.1.21 |
| Checkmarx-KICS-SupplyChain | Supply Chain Attack | Malicious VS Code Extensions related to KICS |