Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Multiple SQL Injections

    April 24, 2026

    SSA-225578 V1.1 (Last Update: 2025-11-11): Improper Access Control Vulnerability in SICAM GridEdge Before V2.7.3

    April 24, 2026

    New Checkmarx supply-chain breach affects KICS analysis tool

    April 24, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»New Checkmarx supply-chain breach affects KICS analysis tool
    News

    New Checkmarx supply-chain breach affects KICS analysis tool

    adminBy adminApril 24, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    New Checkmarx supply-chain breach affects KICS analysis tool

    Hackers have compromised Docker images, VSCode and Open VSX extensions for the Checkmarx KICS analysis tool to harvest sensitive data from developer environments.

    KICS, short for Keeping Infrastructure as Code Secure, is a free, open-source scanner that helps developers identify security vulnerabilities in source code, dependencies, and configuration files.

    The tool is typically run locally via CLI or Docker, and processes sensitive infrastructure configs that often contain credentials, tokens, and internal architecture details.

    image

    Dependency security company Socket investigated the incident after receiving an alert from Docker about malicious images pushed to the official checkmarx/kics Docker Hub repository.

    The investigation revealed that the compromise extended beyond the trojanized KICS Docker image to VS Code and Open VSX extensions that downloaded a hidden ‘MCP addon’ feature designed to fetch the secret-stealing malware.

    Socket found that the ‘MCP addon’ feature downloaded from a hardcoded GitHub URL “a multi-stage credential theft and propagation component” as mcpAddon.js.

    According to the researchers, the malware targets precisely the data processed by KICS, including GitHub tokens, cloud (AWS, Azure, Google Cloud) credentials, npm tokens, SSH keys, Claude configs, and environment variables.

    It then encrypts it and exfiltrates it to audit.checkmarx[.]cx, a domain designed to impersonate legitimate Checkmarx infrastructure. Moreover, public GitHub repositories are automatically created for data exfiltration.

    Automatically created GitHub repositories
    Automatically created GitHub repositories
    Source: Socket

    It is important to clarify that Docker tags were temporarily repointed to a malicious digest, so the impact depends on when they were pulled. The dangerous timeframe for the DockerHub KICS image was from 2026-04-22 14:17:59 UTC to 2026-04-22 15:41:31 UTC.

    Affected tags have now been restored to their legitimate image digests, and the fake v2.1.21 tag was deleted entirely.

    Developers who have downloaded the above should consider their secrets compromised, rotate them as soon as possible, and rebuild their environments from a known safe point.

    While the TeamPCP hackers, responsible for the massive Trivy and LiteLLM supply-chain compromise, claimed the attack publicly, the researchers could not find sufficient evidence beyond pattern-based correlations to confidently attribute it.

    BleepingComputer has reached out to Checkmarx, an application security testing company, for a statement, but a comment wasn’t immediately available.

    Meanwhile, the company published a security bulletin about the incident, assuring users that all malicious artifacts have been removed, and their exposed credentials were revoked and rotated.

    The firm is currently investigating with help from external experts and has promised to provide more information as it becomes available.

    Users of the compromised tool are recommended to block access to ‘checkmarx.cx => 91[.]195[.]240[.]123’ and ‘audit.checkmarx.cx => 94[.]154[.]172[.]43,’ use pinned SHAs, revert to known safe versions, and rotate secrets and credentials if compromise is suspected or confirmed.

    The latest safe versions of the compromised projects are: DockerHub KICS v2.1.20, Checkmarx ast-github-action v2.3.36, Checkmarx VS Code extensions v2.64.0, and Checkmarx Developer Assist extension v1.18.0.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSSA-631336 V1.1 (Last Update: 2025-11-11): Multiple Web Server Vulnerabilities in SICAM GridEdge Before V2.6.6
    Next Article SSA-225578 V1.1 (Last Update: 2025-11-11): Improper Access Control Vulnerability in SICAM GridEdge Before V2.7.3
    admin
    • Website

    Related Posts

    News

    Researchers Simulated a Delusional User to Test Chatbot Safety

    April 24, 2026
    News

    Trigona ransomware attacks use custom exfiltration tool to steal data

    April 23, 2026
    News

    International cyber agencies share fresh advice to defend against China-linked covert networks

    April 23, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Catchy & Intriguing

    March 17, 202660 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Catchy & Intriguing

    March 17, 202660 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202620 Views

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views
    Our Picks

    Multiple SQL Injections

    April 24, 2026

    SSA-225578 V1.1 (Last Update: 2025-11-11): Improper Access Control Vulnerability in SICAM GridEdge Before V2.7.3

    April 24, 2026

    New Checkmarx supply-chain breach affects KICS analysis tool

    April 24, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.