كل المقالات
Cybersecurity

Checkmarx KICS Supply Chain Breach Steals Dev Credentials

Huma Shazia23 April 2026 at 10:23 pm5 دقيقة للقراءة
Checkmarx KICS Supply Chain Breach Steals Dev Credentials

Key Takeaways

Checkmarx KICS Supply Chain Breach Steals Dev Credentials
Source: BleepingComputer
  • Docker images and VS Code extensions for KICS were compromised to steal cloud credentials and tokens
  • The dangerous Docker Hub window was April 22, 14:17:59 to 15:41:31 UTC
  • Affected developers should rotate all secrets and rebuild environments immediately

What Happened

Attackers compromised the official Docker images, VS Code extensions, and Open VSX extensions for Checkmarx KICS. The goal: harvest credentials from developer machines running the popular infrastructure-as-code security scanner.

KICS (Keeping Infrastructure as Code Secure) is a free, open-source tool that scans source code, dependencies, and configuration files for security vulnerabilities. Developers typically run it locally through CLI or Docker. The tool processes sensitive infrastructure configs that often contain credentials, tokens, and internal architecture details. That makes it a perfect target.

Dependency security firm Socket investigated after Docker alerted them to malicious images pushed to the official checkmarx/kics Docker Hub repository. The compromise ran deeper than just Docker. The VS Code and Open VSX extensions had been modified to download a hidden "MCP addon" feature that fetched credential-stealing malware.

How the Attack Worked

Socket found that the MCP addon feature downloaded from a hardcoded GitHub URL what they described as "a multi-stage credential theft and propagation component" named mcpAddon.js.

The malware targeted exactly the data that KICS processes:

  • GitHub tokens
  • AWS, Azure, and Google Cloud credentials
  • npm tokens
  • SSH keys
  • Claude configs
  • Environment variables

After collection, the malware encrypted the stolen data and sent it to audit.checkmarx[.]cx. That domain was designed to look like legitimate Checkmarx infrastructure. The attackers also automatically created public GitHub repositories for data exfiltration.

Automatically created GitHub repositories
Public GitHub repositories automatically created by the malware for data exfiltration

The Attack Window

Docker tags were temporarily repointed to a malicious digest. The dangerous timeframe for the Docker Hub KICS image was narrow but damaging: April 22, 2026, from 14:17:59 UTC to 15:41:31 UTC. That's about 83 minutes.

83 minutes
The window when malicious Docker images were live on the official Checkmarx KICS repository

Affected tags have been restored to their legitimate image digests. The fake v2.1.21 tag was deleted entirely.

Who's Behind It

A group called TeamPCP publicly claimed responsibility for the attack. This same group was behind the recent massive Trivy and LiteLLM supply-chain compromise. However, Socket's researchers could not find sufficient evidence beyond pattern-based correlations to confidently attribute it.

Also Read
OpenAI Launches Trusted Access Program for Microsoft Cyber Defense

Related coverage on security measures in developer tooling

What Checkmarx Says

Checkmarx published a security bulletin about the incident. The company says all malicious artifacts have been removed and their exposed credentials were revoked and rotated. The firm is investigating with help from external experts and has promised to provide more information as it becomes available.

BleepingComputer reached out to Checkmarx for comment, but the company had not responded at publication time.

What You Should Do Now

If you pulled the KICS Docker image or installed the VS Code/Open VSX extensions during the affected window, consider your secrets compromised. Here's your action list:

  1. Rotate all credentials that may have been exposed: GitHub tokens, cloud provider credentials (AWS, Azure, GCP), npm tokens, SSH keys
  2. Audit your environment variables for anything sensitive
  3. Rebuild your development environment from a known safe point
  4. Check your CI/CD pipelines that use KICS for any pulls during the attack window
  5. Review your AWS CloudTrail, Azure Activity Log, and GCP Audit Logs for suspicious activity

Even if you're not certain you were affected, rotating credentials as a precaution is reasonable given the sensitivity of what KICS typically accesses.

Also Read
4 Tips Remote Workers Need to Protect Data in Public

Additional security practices for developers

The Bigger Picture

This attack follows a pattern we've seen increasingly in 2026. Attackers are targeting the tools developers trust to secure their code. The irony is intentional. A tool designed to find security vulnerabilities becomes the vector for compromise.

Supply chain attacks on developer tools are attractive because they offer access to credentials for production systems. A compromised developer laptop often holds keys to cloud infrastructure, source code repositories, and deployment pipelines.

ℹ️

Logicity's Take

Frequently Asked Questions

Was the Checkmarx KICS supply chain attack fixed?

Yes. Checkmarx has restored the affected Docker tags to legitimate image digests, deleted the malicious v2.1.21 tag, and removed malicious VS Code and Open VSX extensions. The company has also revoked and rotated their own exposed credentials.

How do I know if I was affected by the KICS breach?

Check if you pulled the Docker image from checkmarx/kics or installed the VS Code/Open VSX extensions between April 22, 2026, 14:17:59 UTC and 15:41:31 UTC. Also check your CI/CD pipeline logs for automated pulls during that window.

What credentials were stolen in the Checkmarx attack?

The malware targeted GitHub tokens, AWS/Azure/Google Cloud credentials, npm tokens, SSH keys, Claude configs, and environment variables. It specifically harvested the types of secrets that KICS typically processes.

Who was behind the Checkmarx KICS attack?

A group called TeamPCP publicly claimed responsibility. They were also linked to the Trivy and LiteLLM supply chain compromises. However, researchers have not been able to definitively confirm attribution beyond pattern-based correlations.

Should I stop using Checkmarx KICS?

The current versions are clean. This was a supply chain compromise of the distribution channel, not a flaw in KICS itself. Verify you're pulling from restored legitimate sources and continue using the tool.

ℹ️

Need Help Implementing This?

Source: BleepingComputer

H

Huma Shazia

Senior AI & Tech Writer

اقرأ أيضاً

رأي مغاير: كيف يؤثر اختراق الأمن الداخلي الأميركي على شركاتنا الخاصة؟
الأمن السيبراني·8 د

رأي مغاير: كيف يؤثر اختراق الأمن الداخلي الأميركي على شركاتنا الخاصة؟

في ظل اختراق عقود الأمن الداخلي الأميركي مع شركات خاصة، نناقش تأثير هذا الاختراق على مستقبل الأمن السيبراني. نستعرض الإحصاءات الموثوقة ونناقش كيف يمكن للشركات الخاصة أن تتعامل مع هذا التهديد. استمتع بقراءة هذا التحليل العميق

عمر حسن·
الإنسان في زمن ما بعد الوجود البشري: نحو نظام للتعايش بين الإنسان والروبوت - Centre for Arab Unity Studies
الروبوتات·8 د

الإنسان في زمن ما بعد الوجود البشري: نحو نظام للتعايش بين الإنسان والروبوت - Centre for Arab Unity Studies

في هذا المقال، سنناقش كيف يمكن للبشر والروبوتات التعايش في نظام متكامل. سنستعرض التحديات والحلول المحتملة التي تضعها شركات مثل جوجل وأمازون. كما سنلقي نظرة على التوقعات المستقبلية وفقًا لتقرير ماكنزي

فاطمة الزهراء·
إطلاق ناسا لمهمة مأهولة إلى القمر: خطوة تاريخية نحو استكشاف الفضاء
أخبار التقنية·7 د

إطلاق ناسا لمهمة مأهولة إلى القمر: خطوة تاريخية نحو استكشاف الفضاء

تعتبر المهمة الجديدة خطوة هامة نحو استكشاف الفضاء وتطوير التكنولوجيا. سوف تشمل المهمة إرسال رواد فضاء إلى سطح القمر لconducting تجارب علمية. ستسهم هذه المهمة في تطوير فهمنا للفضاء وتحسين التكنولوجيا المستخدمة في استكشاف الفضاء.

عمر حسن·