# Malicious Docker Images and Extensions Compromise Checkmarx KICS Repository in Major Supply Chain Attack
Cybersecurity researchers have uncovered a significant supply chain attack targeting the popular Checkmarx KICS (Keeping Infrastructure as Code Secure) project, with unknown threat actors successfully injecting malicious code into official Docker images and VS Code extensions. The attack, detailed in an alert published by Socket, a software supply chain security firm, represents a concerning escalation in threats targeting development infrastructure tools.
## The Breach: What Happened
Security researchers at Socket discovered that unknown threat actors had gained unauthorized access to the official checkmarx/kics Docker Hub repository and managed to overwrite existing tags with compromised versions. The attackers successfully replaced legitimate images for versions v2.1.20 and alpine, while also introducing a new v2.1.21 tag that does not correspond to any official Checkmarx release.
The compromise extended beyond Docker images to include malicious VS Code extensions, suggesting a coordinated, multi-vector supply chain attack designed to maximize exposure across different development environments and workflows. This multi-platform approach indicates sophisticated threat actors with knowledge of how development teams consume these tools.
Timeline of compromise:
## Background and Context: Why KICS Matters
KICS is a widely-used, open-source static analysis tool designed to find security vulnerabilities and misconfigurations in Infrastructure as Code (IaC) files. It supports dozens of frameworks and file types, including Terraform, CloudFormation, Kubernetes YAML, Docker Compose, and more.
The significance of this target:
This attack exploits a fundamental supply chain vulnerability: the implicit trust developers place in official repositories and branded tools. Unlike downloading a random package from an untrusted source, developers assume that official Docker Hub repositories and marketplace extensions have been properly secured.
## Technical Details: How the Attack Worked
The attackers demonstrated sophisticated understanding of Docker Hub repository management and marketplace systems:
Docker Image Compromise:
VS Code Extension Compromise:
## Implications for Organizations
This attack poses serious risks across multiple layers of the software development lifecycle:
### Immediate Risks
| Risk Category | Impact |
|---------------|--------|
| Credential Exposure | Malicious code can intercept and steal API keys, cloud credentials, and authentication tokens stored in IaC files |
| Code Repository Access | Attack can exfiltrate source code, configuration secrets, and deployment logic |
| CI/CD Pipeline Compromise | Malicious containers execute within CI/CD pipelines, potentially compromising the entire build and deployment process |
| Development Machine Compromise | VS Code extensions with elevated privileges can establish persistence and lateral movement |
| Supply Chain Propagation | Infected artifacts can be pushed through the pipeline to production environments |
### Who Was Affected
Any organization using:
### Attack Surface Scope
The breadth of potential exposure is significant:
## How Checkmarx and Socket Responded
Socket's detection capabilities identified the compromised images through behavioral analysis and signature detection. Checkmarx has since:
## What Organizations Should Do Now
### Immediate Actions (Next 24 Hours)
1. Audit Docker image usage: Review all Docker Compose files, Kubernetes manifests, and CI/CD configurations for references to checkmarx/kics images
2. Check VS Code extensions: Verify which extensions are installed on development machines and in team configurations
3. Review logs: Check container execution logs and VS Code marketplace access for evidence of compromise
4. Pull latest versions: Update to the latest patched KICS version from Checkmarx's official GitHub releases, not Docker Hub
5. Scan for IOCs: Run security tools to detect any indicators of compromise on affected systems
### Short-term Remediation (This Week)
### Long-term Recommendations
## Broader Implications for Supply Chain Security
This attack exemplifies why supply chain security must be a primary concern for security teams:
Key lessons:
## Conclusion
The malicious KICS Docker images and VS Code extensions represent a sophisticated, multi-vector supply chain attack that demonstrates the evolving threat landscape facing development organizations. While Checkmarx and the security community have responded quickly, the incident underscores the need for organizations to implement robust supply chain security practices, including container image verification, dependency monitoring, and immediate incident response capabilities.
Development teams should treat this as a critical security incident requiring immediate investigation and remediation across all affected systems and pipelines.