Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain

Summary

Researchers discovered malicious Docker images and VS Code extensions targeting the Checkmarx supply chain. Threat actors compromised official "checkmarx/kics" Docker Hub repository tags and introduced unauthorized versions, posing a significant risk to users relying on these official sources.

IFF Assessment

FOE

This is bad news for defenders as it demonstrates a sophisticated supply chain attack that compromises trusted software sources, potentially infecting numerous downstream users.

Defender Context

This incident highlights the critical need for robust supply chain security measures, including image verification, dependency scanning, and monitoring of official repositories for unauthorized changes. Defenders must be vigilant about the integrity of their development and deployment pipelines, as compromised official sources can lead to widespread infection.

Read Full Story →