Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain
The Hacker NewsArchived Apr 22, 2026✓ Full text saved
Cybersecurity researchers have warned of malicious images pushed to the official "checkmarx/kics" Docker Hub repository. In an alert published today, software supply chain security company Socket revealed that unknown threat actors managed to have overwritten existing tags, including v2.1.20 and alpine, while also introducing a new v2.1.21 tag that does not correspond to an official release. The
Full text archived locally
✦ AI Summary· Claude Sonnet
Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain
Ravie LakshmananApr 22, 2026Cloud Security / Software Security
Cybersecurity researchers have warned of malicious images pushed to the official "checkmarx/kics" Docker Hub repository.
In an alert published today, software supply chain security company Socket revealed that unknown threat actors managed to have overwritten existing tags, including v2.1.20 and alpine, while also introducing a new v2.1.21 tag that does not correspond to an official release. The Docker repository has been archived as of writing.
"Analysis of the poisoned image indicates that the bundled KICS binary was modified to include data collection and exfiltration capabilities not present in the legitimate version," Socket said.
"The malware could generate an uncensored scan report, encrypt it, and send it to an external endpoint, creating a serious risk for teams using KICS to scan infrastructure-as-code files that may contain credentials or other sensitive configuration data."
Further analysis of the incident has uncovered that related Checkmarx developer tooling may also have been affected, such as recent Microsoft Visual Studio Code extension releases that come with malicious code to download and run a remote addon through the Bun runtime.
"The behavior appeared in versions 1.17.0 and 1.19.0, was removed in 1.18.0, and relied on a hardcoded GitHub URL to fetch and run additional JavaScript without user confirmation or integrity verification," Socket added.
Organizations that may have used the affected KICS image to scan Terraform, CloudFormation, or Kubernetes configurations should treat any secrets or credentials exposed to those scans as likely compromised.
"The evidence suggests this is not an isolated Docker Hub incident, but part of a broader supply chain compromise affecting multiple Checkmarx distribution channels," the company noted.
The Hacker News has contacted Checkmarx for further information, and we will update the story if we hear back.
(This is a developing story. Please check back for more details.)
Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.
SHARE
Tweet
Share
Share
SHARE
Checkmarx, Cloud security, cybersecurity, Docker, Malware, software security, supply chain attack, Visual Studio Code
Trending News
Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads
108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users
Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails
Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities
Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation
Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched
New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released
Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials
The Hidden Security Risks of Shadow AI in Enterprises
Why Threat Intelligence Is the Missing Link in CTEM Prioritization and Validation
Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution
OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams
Why Security Leaders Are Layering Email Defense on Top of Secure Email Gateways
Your MTTD Looks Great. Your Post-Alert Gap Doesn't
Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain
Load More ▼
Popular Resources
How to Identify Risky Browser Extensions in Your Organization
Discover Key AI Security Gaps CISOs Face in 2026
Automate Alert Triage and Investigations Across Every Threat
Fix Rising Application Security Risks Driven by AI Development