Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain
Overview
Researchers have discovered that malicious Docker images were uploaded to the official 'checkmarx/kics' repository on Docker Hub. Unknown attackers managed to overwrite existing tags such as v2.1.20 and alpine, and they also created a new tag, v2.1.21, which does not match any legitimate release. This poses a significant risk to users who may unknowingly download these compromised images, potentially exposing their systems to vulnerabilities. Companies relying on these Docker images for software development or deployment should take immediate action to ensure their environments are secure. This incident highlights the ongoing challenges in securing software supply chains against malicious actors.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: checkmarx/kics Docker images, versions v2.1.20, alpine, and v2.1.21
- Action Required: Users should verify the integrity of Docker images before use, ensure they are pulling from trusted sources, and monitor for any updates from Checkmarx regarding this incident.
- Timeline: Newly disclosed
Original Article Summary
Cybersecurity researchers have warned of malicious images pushed to the official "checkmarx/kics" Docker Hub repository. In an alert published today, software supply chain security company Socket revealed that unknown threat actors managed to have overwritten existing tags, including v2.1.20 and alpine, while also introducing a new v2.1.21 tag that does not correspond to an official release. The
Impact
checkmarx/kics Docker images, versions v2.1.20, alpine, and v2.1.21
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Newly disclosed
Remediation
Users should verify the integrity of Docker images before use, ensure they are pulling from trusted sources, and monitor for any updates from Checkmarx regarding this incident.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Malware.