
🎯Basically, bad guys tampered with software tools used by developers, risking sensitive data exposure.
What Happened
Cybersecurity researchers have issued a warning regarding malicious Docker images found in the official "checkmarx/kics" repository on Docker Hub. An alert from the software supply chain security company Socket revealed that unknown threat actors successfully overwrote existing tags, including v2.1.20 and alpine, while introducing a new tag, v2.1.21, that does not correspond to any official release.
Who's Affected
Organizations using Checkmarx's KICS (Keeping Infrastructure as Code Secure) tool for scanning infrastructure-as-code files, such as Terraform, CloudFormation, or Kubernetes configurations, may be at risk. Additionally, developers utilizing recent versions of Microsoft Visual Studio Code extensions that interface with Checkmarx may also be affected.
What Data Was Exposed
The compromised KICS image has been modified to include data collection and exfiltration capabilities not present in the legitimate version. This malware can generate uncensored scan reports, encrypt them, and send them to an external endpoint. As a result, sensitive configuration data, including credentials, may have been exposed during scans.
What You Should Do
Organizations that have used the affected KICS image should consider any secrets or credentials exposed during scans as likely compromised. It is crucial to:
Immediate
- 1.Revoke any exposed credentials immediately.
- 2.Monitor for unusual activity in your systems.
Long-term
- 3.Update your security tools to ensure you are using legitimate versions.
- 4.Educate your teams about the risks of using unverified software.
Technical Details
Further analysis indicated that the malicious behavior was also present in specific Visual Studio Code extension versions (1.17.0 and 1.19.0). These versions contained code that allowed them to download and run a remote addon through the Bun runtime without user confirmation or integrity verification. The malicious code was removed in version 1.18.0, but the prior versions may have already impacted users.
Industry Impact
This incident highlights a broader supply chain compromise affecting multiple distribution channels of Checkmarx. As organizations increasingly rely on third-party tools and libraries, the risk of such attacks grows. It serves as a reminder for all developers and organizations to ensure they are sourcing software from trusted and verified repositories.
Conclusion
The Checkmarx supply chain incident underscores the importance of vigilance in software security. As threat actors become more sophisticated, organizations must adopt proactive measures to safeguard their systems and sensitive data from potential breaches.
🔒 Pro insight: This incident exemplifies the vulnerabilities inherent in supply chain dependencies, necessitating rigorous verification of third-party software.





