Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Warning on Malicious KICS Docker Images and Extensions

Warning on Malicious KICS Docker Images and Extensions

Posted on April 22, 2026 By CWS

Cybersecurity experts have issued a warning about malicious images uploaded to the ‘checkmarx/kics’ repository on Docker Hub. This alert, shared by software supply chain security firm Socket, highlights that unknown attackers have overwritten existing tags such as v2.1.20 and alpine, and introduced a suspicious tag v2.1.21, which is not part of any official release. The compromised repository has been archived.

Disguised Malicious Features

The altered Docker images contained a modified KICS binary capable of collecting and exfiltrating data, functionalities absent in official versions. The malware could generate unfiltered scan reports, encrypt them, and transmit the data to an external location. This poses a significant threat to teams using KICS for scanning infrastructure-as-code files, which might include sensitive information like credentials.

Further examination revealed that Checkmarx’s developer tools, such as Microsoft Visual Studio Code extensions, were also impacted. The malicious code within these extensions, present in versions 1.17.0 and 1.19.0 but removed in 1.18.0, could download and execute a remote addon via Bun runtime using a hardcoded GitHub URL, bypassing user consent and integrity checks.

Potential Impact and Recommendations

Organizations that utilized the compromised KICS images for scanning configurations in Terraform, CloudFormation, or Kubernetes should assume that any exposed secrets or credentials are compromised. The incident is not limited to Docker Hub alone but is part of a larger supply chain attack affecting multiple distribution channels of Checkmarx, as stated by Socket.

The Hacker News has reached out to Checkmarx for further comments and will provide updates as more information becomes available. This developing story emphasizes the importance of vigilance in software supply chain security and the need for immediate action from affected organizations.

Looking Ahead and Mitigation

This incident underscores the critical need for continuous monitoring and validation of software supply chains. Organizations are advised to review their security protocols and ensure that all components are obtained from trusted sources. Regular updates and patches are essential to protect against such vulnerabilities.

As this situation evolves, cybersecurity firms and affected companies must collaborate to mitigate risks and strengthen the integrity of their software ecosystems. Stay tuned for further updates as this story develops.

The Hacker News Tags:Checkmarx, cloud security, Cybersecurity, data exfiltration, developer tools, Docker, GitHub, JavaScript, KICS, Malware, Software Security, supply chain, Threat Actors, VS Code

Post navigation

Previous Post: Essential Phishing Defense Strategies for CISOs
Next Post: French Fintech Accounts Abused by Cybercriminals for Money Laundering

Related Posts

Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts The Hacker News
AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe The Hacker News
Agentic AI Revolutionizes Security Validation Agentic AI Revolutionizes Security Validation The Hacker News
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale The Hacker News
TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs The Hacker News
New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malware Campaign Utilizes Fake GitHub Repositories
  • Crypto Users Targeted by Fake Google Ads and Wallet Drainers
  • French Fintech Accounts Abused by Cybercriminals for Money Laundering
  • Warning on Malicious KICS Docker Images and Extensions
  • Essential Phishing Defense Strategies for CISOs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malware Campaign Utilizes Fake GitHub Repositories
  • Crypto Users Targeted by Fake Google Ads and Wallet Drainers
  • French Fintech Accounts Abused by Cybercriminals for Money Laundering
  • Warning on Malicious KICS Docker Images and Extensions
  • Essential Phishing Defense Strategies for CISOs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark