CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership Apr 22, 2026

Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain

The Hacker News Archived Apr 22, 2026 ✓ Full text saved

Cybersecurity researchers have warned of malicious images pushed to the official "checkmarx/kics" Docker Hub repository. In an alert published today, software supply chain security company Socket revealed that unknown threat actors managed to have overwritten existing tags, including v2.1.20 and alpine, while also introducing a new v2.1.21 tag that does not correspond to an official release. The

Full text archived locally
✦ AI Summary · Claude Sonnet


    Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain Ravie LakshmananApr 22, 2026Cloud Security / Software Security Cybersecurity researchers have warned of malicious images pushed to the official "checkmarx/kics" Docker Hub repository. In an alert published today, software supply chain security company Socket revealed that unknown threat actors managed to have overwritten existing tags, including v2.1.20 and alpine, while also introducing a new v2.1.21 tag that does not correspond to an official release. The Docker repository has been archived as of writing. "Analysis of the poisoned image indicates that the bundled KICS binary was modified to include data collection and exfiltration capabilities not present in the legitimate version," Socket said. "The malware could generate an uncensored scan report, encrypt it, and send it to an external endpoint, creating a serious risk for teams using KICS to scan infrastructure-as-code files that may contain credentials or other sensitive configuration data." Further analysis of the incident has uncovered that related Checkmarx developer tooling may also have been affected, such as recent Microsoft Visual Studio Code extension releases that come with malicious code to download and run a remote addon through the Bun runtime. "The behavior appeared in versions 1.17.0 and 1.19.0, was removed in 1.18.0, and relied on a hardcoded GitHub URL to fetch and run additional JavaScript without user confirmation or integrity verification," Socket added. Organizations that may have used the affected KICS image to scan Terraform, CloudFormation, or Kubernetes configurations should treat any secrets or credentials exposed to those scans as likely compromised. "The evidence suggests this is not an isolated Docker Hub incident, but part of a broader supply chain compromise affecting multiple Checkmarx distribution channels," the company noted. The Hacker News has contacted Checkmarx for further information, and we will update the story if we hear back. (This is a developing story. Please check back for more details.) Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post. SHARE     Tweet Share Share SHARE  Checkmarx, Cloud security, cybersecurity, Docker, Malware, software security, supply chain attack, Visual Studio Code Trending News Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads 108 Malicious Chrome Extensions Steal Google and Telegram Data, Affecting 20,000 Users Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched New PHP Composer Flaws Enable Arbitrary Command Execution — Patches Released Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials The Hidden Security Risks of Shadow AI in Enterprises Why Threat Intelligence Is the Missing Link in CTEM Prioritization and Validation Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams Why Security Leaders Are Layering Email Defense on Top of Secure Email Gateways Your MTTD Looks Great. Your Post-Alert Gap Doesn't Anthropic MCP Design Vulnerability Enables RCE, Threatening AI Supply Chain Load More ▼ Popular Resources How to Identify Risky Browser Extensions in Your Organization Discover Key AI Security Gaps CISOs Face in 2026 Automate Alert Triage and Investigations Across Every Threat Fix Rising Application Security Risks Driven by AI Development
    💬 Team Notes
    Article Info
    Source
    The Hacker News
    Category
    ◇ Industry News & Leadership
    Published
    Apr 22, 2026
    Archived
    Apr 22, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗