Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
Home/CyberSecurity News/Checkmarx KICS Docker Repo Compromised: Malicious Official Inject
CyberSecurity News

Checkmarx KICS Docker Repo Compromised: Malicious Official Inject

Threat actors executed a significant supply chain attack targeting the official checkmarx/kics Docker Hub repository. They pushed trojanized images designed to harvest and exfiltrate sensitive...

Jennifer sherman
Jennifer sherman
April 23, 2026 3 Min Read
13 0

Threat actors executed a significant supply chain attack targeting the official checkmarx/kics Docker Hub repository. They pushed trojanized images designed to harvest and exfiltrate sensitive developer credentials and infrastructure secrets.

Table Of Content

  • Trojanized Binary and Credential Exfiltration
  • VS Code Extensions Also Weaponized
  • Mitigations
  • Key Indicators of Compromise

Docker’s internal monitoring flagged suspicious activity around KICS image tags on April 22, 2026, and promptly alerted Socket researchers.

The investigation revealed that attackers had overwritten existing tags, including v2.1.20 and alpine while also introducing a new v2.1.21 tag that has no corresponding legitimate upstream release.

The affected tags ultimately included v2.1.20-debian, v2.1.20, debian, alpine, and latest, all of which have since been restored to their prior legitimate releases.

KICS, short for Keeping Infrastructure as Code Secure, is an open-source tool widely used by DevOps and security teams to scan Terraform, CloudFormation, and Kubernetes configurations for security misconfigurations. Its broad adoption across CI/CD pipelines made it an especially high-value target for supply chain attackers.

Trojanized Binary and Credential Exfiltration

Analysis of the poisoned KICS images revealed that the bundled ELF binary written in Golang had been modified to include unauthorized telemetry and data exfiltration capabilities entirely absent from the legitimate version.

The malware was designed to generate uncensored IaC scan reports, encrypt the results, and silently transmit them to an attacker-controlled external endpoint at https://audit.checkmarx[.]cx/v1/telemetry.

Organizations that used the affected images to scan infrastructure-as-code files should treat any exposed secrets, cloud credentials, or API keys as potentially compromised.

The malicious binary shared the same Command and Control (C2) server address as a separately discovered JavaScript payload called mcpAddon.js, indicating a coordinated, multi-component attack infrastructure.

VS Code Extensions Also Weaponized

As Socket researchers expanded their investigation, the scope broadened well beyond Docker Hub. Trojanized versions of Checkmarx’s VS Code and Open VSX extensions were also identified specifically, cx-dev-assist versions 1.17.0 and 1.19.0, and ast-results versions 2.63.0 and 2.66.0.

These extensions, upon activation, silently downloaded a second-stage payload (mcpAddon.js) from a hardcoded GitHub URL pointing to an orphaned backdated commit (68ed490b) in the official Checkmarx repository, then executed it using the Bun runtime without user consent or integrity verification.

mcpAddon compromise
mcpAddon compromise

The mcpAddon.js file a heavily obfuscated, ~10MB JavaScript bundle functioned as a full-featured credential stealer.

It harvested GitHub authentication tokens, AWS credentials, Azure and Google Cloud tokens, npm configuration files, SSH keys, and environment variables, compressing and encrypting the exfiltrated data before sending it to the attacker’s endpoint.

The malware’s reach extended beyond credential theft. Using stolen GitHub tokens, the malware injected malicious GitHub Actions workflows (.github/workflows/format-check.yml) into repositories the victim had write access to.

The workflow exploited ${{ toJSON(secrets) }} to serialize and exfiltrate the entire secrets context of each targeted repository as a downloadable artifact. Stolen npm tokens were further abused to identify and republish writable packages, enabling downstream supply-chain propagation across the npm ecosystem.

The threat actor group TeamPCP appears to be claiming credit for the attack. Their account on X posted taunting messages after the story broke, stating “Thank you OSS distribution for another very successful day at PCP inc.”.

This is consistent with TeamPCP’s prior March 2026 campaign, in which the group compromised Checkmarx GitHub Actions and OpenVSX plugins in a broader supply chain attack that also targeted Trivy and LiteLLM.mrcloudbook+2

Mitigations

Security teams should take the following actions immediately:

  • Remove all affected KICS Docker images, VS Code extensions, and GitHub Actions from developer systems and build pipelines
  • Rotate GitHub tokens, npm tokens, cloud credentials (AWS, Azure, GCP), SSH keys, and all CI/CD secrets exposed to affected environments
  • Audit GitHub repositories for unauthorized workflow files, unexpected branch creation, suspicious artifact downloads, and public repositories named with the pattern <word>-<word>-<3 digits> with the description “Checkmarx Configuration Storage”
  • Hunt for outbound connections to 94[.]154[.]172[.]43 or audit.checkmarx[.]cx, unexpected Bun runtime execution, and unauthorized access to .npmrc, .env, or cloud credential stores
  • Pin Docker image references to verified SHA256 digests rather than mutable tags

Key Indicators of Compromise

Artifact Indicator
C2 Endpoint https://audit.checkmarx[.]cx/v1/telemetry
Malicious IP 94[.]154[.]172[.]43
mcpAddon.js SHA256 24680027afadea90c7c713821e214b15cb6c922e67ac01109fb1edb3ee4741d9
KICS ELF SHA256 2a6a35f06118ff7d61bfd36a5788557b695095e7c9a609b4a01956883f146f50
Affected Docker tags alpine, latest, debian, v2.1.20, v2.1.21, v2.1.20-debian

Socket has disclosed its findings to the Checkmarx security team and continues to publish updated technical analysis as the investigation develops. The Docker repository has been archived, and all affected tags have been restored to verified legitimate releases.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Fake GitHub Repos Deliver SmartLoader & StealC Malware

Next Post

Apple Fixes Signal Notification Privacy Flaw from FBI Access

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us