Checkmarx KICS Docker repo compromised in supply chain attack that exposed secrets


Checkmarx KICS users need to treat this as a real supply chain incident. Malicious images were pushed to the official checkmarx/kics Docker Hub repository on April 22, 2026, and the poisoned builds could collect scan output and send it to attacker-controlled infrastructure.

That matters because KICS scans infrastructure-as-code files such as Terraform, CloudFormation, and Kubernetes manifests. Those scans often contain secrets, internal hostnames, cloud resource names, API keys, and other sensitive data that should never leave a trusted environment.

Docker said a threat actor used valid Checkmarx publisher credentials to authenticate to Docker Hub and push the malicious images. Docker also said its own infrastructure was not breached, which means the issue came from abused publisher access rather than a Docker platform compromise.

What happened and what was affected

According to Docker’s timeline, the attacker overwrote five existing tags in the checkmarx/kics repository: latest, v2.1.20, v2.1.20-debian, alpine, and debian. Two new tags, v2.1.21 and v2.1.21-debian, were also created during the attack.

Socket’s analysis found that the modified KICS binary kept the normal scanning behavior but added a hidden exfiltration path. The malicious code collected scan output, encrypted it, and sent it to infrastructure tied to audit.checkmarx[.]cx, which Socket and Checkmarx both list as part of the incident.

Checkmarx’s April 22 security update shows the incident spread beyond Docker images. The company also listed affected developer extensions and advised customers to block attacker domains, rotate secrets if compromise is suspected, and use pinned SHAs or review auto-update settings in IDE marketplaces.

Why this incident is bigger than one Docker image

This attack did not appear in isolation. Checkmarx had already disclosed a March 23, 2026 supply chain incident involving OpenVSX plugins and GitHub Actions, and its latest update connects the broader response to multiple affected artifacts.

Socket also reported signs that related Checkmarx tooling had been weaponized, including suspicious extension releases that could fetch and run a remote addon. That raises the risk beyond container pulls and points to a wider campaign focused on developer environments and CI/CD workflows.

For security teams, the practical takeaway is simple. If your developers, scanners, or pipelines pulled affected KICS tags or used related compromised tooling, you should assume exposed secrets may have been collected and begin incident response immediately.

A quick view of the known impact

ItemWhat is confirmed
Main targetOfficial checkmarx/kics Docker Hub repository
Attack dateApril 22, 2026
Known overwritten tagslatest, v2.1.20, v2.1.20-debian, alpine, debian
New malicious tagsv2.1.21, v2.1.21-debian
Reported exfil domainaudit.checkmarx[.]cx
Checkmarx guidanceBlock domains, rotate secrets, use pinned SHAs, review IDE auto-updates

Source basis for this table: Docker’s incident account, Checkmarx’s April 22 update, and Socket’s technical analysis.

What organizations should do now

  • Remove affected KICS images from developer systems and CI/CD pipelines.
  • Rotate secrets and credentials that may have been exposed during scans. This includes cloud credentials, API keys, and CI/CD secrets.
  • Block the attacker-linked domains and IPs listed by Checkmarx, including audit.checkmarx.cx and checkmarx.cx.
  • Pin image references to verified SHAs instead of mutable tags such as latest.
  • Review IDE extension auto-update behavior and verify installed Checkmarx-related tooling.
  • Inspect repositories and pipeline logs for suspicious workflow changes, unexpected artifact creation, or unusual outbound connections.

FAQ

Was Docker itself breached?

Docker says no. The company said a threat actor used valid Checkmarx publisher credentials and that Docker’s infrastructure was not breached.

Which KICS tags were affected?

The confirmed overwritten tags were latest, v2.1.20, v2.1.20-debian, alpine, and debian. Docker also reported that v2.1.21 and v2.1.21-debian were created during the incident.

Why is this incident so serious?

KICS scans infrastructure-as-code, and those files can expose secrets, credentials, environment details, and internal architecture. A poisoned scanner can quietly collect that information during normal security checks.

What should affected users do first?

Start with containment. Remove affected images and related tooling, block the listed attacker infrastructure, and rotate any credentials that may have touched compromised environments.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages