Malicious KICS Docker Images and VS Code Extensions Hijack Checkmarx Supply Chain

Malicious KICS Docker Images and VS Code Extensions Hijack Checkmarx Supply Chain

The Hacker News reports a critical software supply chain attack targeting Checkmarx’s KICS (Key Infrastructure as Code Security) product. Malicious images were pushed to the official “checkmarx/kics” Docker Hub repository. Threat actors reportedly overwrote existing tags, including v2.1.20 and alpine, and introduced a rogue v2.1.21 tag that does not correspond to any legitimate release. This indicates a compromise of Checkmarx’s Docker Hub account or their CI/CD pipeline.

This incident extends beyond Docker images, with The Hacker News also highlighting malicious VS Code extensions. This dual-pronged attack vector demonstrates a sophisticated approach to poisoning development environments and build processes. Developers pulling these compromised images or installing the malicious extensions would unknowingly integrate backdoors or data exfiltration capabilities directly into their projects, potentially leading to widespread compromise across their organizations.

For defenders, this is a stark reminder that even trusted software supply chains are under constant assault. The attacker’s calculus here is clear: compromise a widely used security tool to gain a foothold in hundreds, if not thousands, of downstream development environments. This isn’t just about a single vulnerability; it’s about subverting the very tools meant to secure our code.

What This Means For You

  • If your organization uses Checkmarx KICS Docker images or related VS Code extensions, you must immediately audit your build environments and developer workstations. Verify the integrity of all `checkmarx/kics` Docker images against official Checkmarx checksums. Revoke any API keys or credentials exposed to potentially compromised build systems. This isn't a drill; malicious code could already be embedded in your software artifacts.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1588 Reconnaissance

Malicious KICS Docker Image Pull

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
Checkmarx-KICS-SupplyChain Supply Chain Attack Malicious Docker images in 'checkmarx/kics' Docker Hub repository
Checkmarx-KICS-SupplyChain Supply Chain Attack Overwritten Docker image tags: v2.1.20, alpine
Checkmarx-KICS-SupplyChain Supply Chain Attack New unofficial Docker image tag: v2.1.21
Checkmarx-KICS-SupplyChain Supply Chain Attack Malicious VS Code Extensions related to KICS
Take action on this incident
📡 Monitor checkmarx.com Free · 1 watchlist slot · instant alerts on new breaches 🔍 Threat intel on Checkmarx All breaches, IOCs & vendor exposure

Related Posts

Mirai Botnet Exploits End-of-Life D-Link Routers via RCE

A new Mirai botnet campaign is actively exploiting a critical command injection vulnerability (CVE-2025-29635) in end-of-life D-Link DIR-823X routers. BleepingComputer reports that this flaw allows...

threat-inteldata-breachmalwarevulnerability
/SCW Vulnerability Desk /HIGH /⚑ 2 IOCs /⚙ 1 Sigma

French Authorities Arrest Hacker Behind Dozens of Breaches

French authorities have apprehended a suspected hacker linked to numerous data breaches targeting public institutions, sports federations, and private organizations across France, according to The...

threat-inteldata-breachgovernment
/SCW Research /MEDIUM

Harvester's GoGra Backdoor Exploits Microsoft Graph API for Linux Targets

The threat actor known as Harvester is deploying a new Linux variant of its GoGra backdoor, specifically targeting entities in South Asia. The malware's ingenuity...

threat-intelvulnerabilitymalwaremicrosoft
/SCW Vulnerability Desk /MEDIUM /⚙ 3 Sigma