Malicious KICS Docker Images Target Checkmarx Supply Chain

Researchers have detected malicious Docker images in Checkmarx's repository, posing serious risks to user data. Affected organizations should act quickly to secure their systems and credentials.

Cloud SecurityHIGHUpdated: Published:
Featured image for Malicious KICS Docker Images Target Checkmarx Supply Chain

Original Reporting

THThe Hacker News

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, bad guys tampered with software tools used by developers, risking sensitive data exposure.

What Happened

Cybersecurity researchers have issued a warning regarding malicious Docker images found in the official "checkmarx/kics" repository on Docker Hub. An alert from the software supply chain security company Socket revealed that unknown threat actors successfully overwrote existing tags, including v2.1.20 and alpine, while introducing a new tag, v2.1.21, that does not correspond to any official release.

Who's Affected

Organizations using Checkmarx's KICS (Keeping Infrastructure as Code Secure) tool for scanning infrastructure-as-code files, such as Terraform, CloudFormation, or Kubernetes configurations, may be at risk. Additionally, developers utilizing recent versions of Microsoft Visual Studio Code extensions that interface with Checkmarx may also be affected.

What Data Was Exposed

The compromised KICS image has been modified to include data collection and exfiltration capabilities not present in the legitimate version. This malware can generate uncensored scan reports, encrypt them, and send them to an external endpoint. As a result, sensitive configuration data, including credentials, may have been exposed during scans.

What You Should Do

Organizations that have used the affected KICS image should consider any secrets or credentials exposed during scans as likely compromised. It is crucial to:

Immediate

  • 1.Revoke any exposed credentials immediately.
  • 2.Monitor for unusual activity in your systems.

Long-term

  • 3.Update your security tools to ensure you are using legitimate versions.
  • 4.Educate your teams about the risks of using unverified software.

Technical Details

Further analysis indicated that the malicious behavior was also present in specific Visual Studio Code extension versions (1.17.0 and 1.19.0). These versions contained code that allowed them to download and run a remote addon through the Bun runtime without user confirmation or integrity verification. The malicious code was removed in version 1.18.0, but the prior versions may have already impacted users.

Industry Impact

This incident highlights a broader supply chain compromise affecting multiple distribution channels of Checkmarx. As organizations increasingly rely on third-party tools and libraries, the risk of such attacks grows. It serves as a reminder for all developers and organizations to ensure they are sourcing software from trusted and verified repositories.

Conclusion

The Checkmarx supply chain incident underscores the importance of vigilance in software security. As threat actors become more sophisticated, organizations must adopt proactive measures to safeguard their systems and sensitive data from potential breaches.

🔒 Pro Insight

🔒 Pro insight: This incident exemplifies the vulnerabilities inherent in supply chain dependencies, necessitating rigorous verification of third-party software.

THThe Hacker News
Read Original

Related Pings