Malicious Artifacts Found in Official KICS Docker Repository and Code Extensions
Docker and Socket uncovered a supply chain compromise affecting Checkmarx KICS distribution channels. Attackers poisoned official Docker Hub images (tags v2.1.20, v2.1.21, alpine) and VS Code extensions (versions 1.17.0, 1.19.0), introducing unauthorized data exfiltration capabilities. The trojanized KICS binary collects and encrypts scan reports containing credentials from infrastructure-as-code files, transmitting them to external endpoints. Compromised VS Code extensions download mcpAddon.js via Bun runtime, harvesting GitHub tokens, AWS credentials, Azure tokens, npm configurations, and SSH keys. The malware creates public GitHub repositories for staging stolen data, injects malicious GitHub Actions workflows to capture repository secrets, and uses stolen npm credentials to identify writable packages for propagation. TeamPCP appears to claim responsibility for this multi-stage attack designed to steal developer credentials and propagate through CI/CD pipelines.
AI Analysis
Technical Summary
This threat involves a supply chain attack targeting Checkmarx KICS distribution channels via poisoned official Docker Hub images and VS Code extensions. The malicious artifacts enable unauthorized data exfiltration by collecting credentials from infrastructure-as-code scan reports and developer environments. The malware leverages the Bun runtime to download additional malicious scripts that harvest a wide range of credentials including GitHub tokens, cloud service tokens, npm credentials, and SSH keys. It further propagates by creating public GitHub repositories to stage stolen data and injecting malicious GitHub Actions workflows to capture secrets from repositories. The attack also attempts to propagate through npm packages using stolen credentials. The adversary identified is TeamPCP, and the attack is designed to compromise CI/CD pipelines and developer environments.
Potential Impact
The compromise results in unauthorized exfiltration of sensitive credentials including GitHub tokens, AWS and Azure tokens, npm credentials, and SSH keys. This can lead to further compromise of developer environments, CI/CD pipelines, and cloud resources. The malware's ability to create public repositories and inject malicious workflows increases the risk of widespread credential theft and propagation within software supply chains. The attack undermines trust in official Checkmarx KICS Docker images and VS Code extensions, potentially impacting organizations relying on these tools for infrastructure-as-code security scanning.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until official fixes or updates are released, users should avoid using the affected Docker image tags (v2.1.20, v2.1.21, alpine) and VS Code extension versions (1.17.0, 1.19.0). Verify the integrity of downloaded artifacts and consider reverting to known clean versions if available. Monitor for suspicious activity related to credential usage and GitHub repository creations. Remove any compromised credentials and rotate secrets that may have been exposed. Follow updates from Checkmarx and trusted security sources for official remediation steps.
Indicators of Compromise
- ip: 94.154.172.43
- hash: d47de3772f2d61a043e7047431ef4cf4
- hash: e1023db24a29ab0229d99764e2c8deba
- hash: 250f3633529457477a9f8fd3db3472e94383606a
- hash: 2b12cc5cc91ec483048abcbd6d523cdc9ebae3f3
- hash: bbbca2ddaa5d8feaa63e36b76fdaad77386f024f
- hash: de0fac2e4500dabe0009e67214ff5f5447ce83dd
- hash: 222e6bfed0f3bb1937bf5e719a2342871ccd683ff1c0cb967c8e31ea58beaf7b
- hash: 24680027afadea90c7c713821e214b15cb6c922e67ac01109fb1edb3ee4741d9
- hash: 2588a44890263a8185bd5d9fadb6bc9220b60245dbcbc4da35e1b62a6f8c230d
- hash: 26e8e9c5e53c972997a278ca6e12708b8788b70575ca013fd30bfda34ab5f48f
- hash: 2a6a35f06118ff7d61bfd36a5788557b695095e7c9a609b4a01956883f146f50
- hash: 415610a42c5b51347709e315f5efb6fffa588b6ebc1b95b24abf28088347791b
- hash: 7391b531a07fccbbeaf59a488e1376cfe5b27aef757430a36d6d3a087c610322
- hash: a0d9366f6f0166dcbf92fcdc98e1a03d2e6210e8d7e8573f74d50849130651a0
- hash: a6871deb0480e1205c1daff10cedf4e60ad951605fd1a4efaca0a9c54d56d1cb
- hash: d186161ae8e33cd7702dd2a6c0337deb14e2b178542d232129c0da64b1af06e4
- hash: ff7b0f114f87c67402dfc2459bb3d8954dd88e537b0e459482c04cffa26c1f07
- url: https://audit.checkmarx.cx/v1/telemetry
- domain: audit.checkmarx.cx
Malicious Artifacts Found in Official KICS Docker Repository and Code Extensions
Description
Docker and Socket uncovered a supply chain compromise affecting Checkmarx KICS distribution channels. Attackers poisoned official Docker Hub images (tags v2.1.20, v2.1.21, alpine) and VS Code extensions (versions 1.17.0, 1.19.0), introducing unauthorized data exfiltration capabilities. The trojanized KICS binary collects and encrypts scan reports containing credentials from infrastructure-as-code files, transmitting them to external endpoints. Compromised VS Code extensions download mcpAddon.js via Bun runtime, harvesting GitHub tokens, AWS credentials, Azure tokens, npm configurations, and SSH keys. The malware creates public GitHub repositories for staging stolen data, injects malicious GitHub Actions workflows to capture repository secrets, and uses stolen npm credentials to identify writable packages for propagation. TeamPCP appears to claim responsibility for this multi-stage attack designed to steal developer credentials and propagate through CI/CD pipelines.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves a supply chain attack targeting Checkmarx KICS distribution channels via poisoned official Docker Hub images and VS Code extensions. The malicious artifacts enable unauthorized data exfiltration by collecting credentials from infrastructure-as-code scan reports and developer environments. The malware leverages the Bun runtime to download additional malicious scripts that harvest a wide range of credentials including GitHub tokens, cloud service tokens, npm credentials, and SSH keys. It further propagates by creating public GitHub repositories to stage stolen data and injecting malicious GitHub Actions workflows to capture secrets from repositories. The attack also attempts to propagate through npm packages using stolen credentials. The adversary identified is TeamPCP, and the attack is designed to compromise CI/CD pipelines and developer environments.
Potential Impact
The compromise results in unauthorized exfiltration of sensitive credentials including GitHub tokens, AWS and Azure tokens, npm credentials, and SSH keys. This can lead to further compromise of developer environments, CI/CD pipelines, and cloud resources. The malware's ability to create public repositories and inject malicious workflows increases the risk of widespread credential theft and propagation within software supply chains. The attack undermines trust in official Checkmarx KICS Docker images and VS Code extensions, potentially impacting organizations relying on these tools for infrastructure-as-code security scanning.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until official fixes or updates are released, users should avoid using the affected Docker image tags (v2.1.20, v2.1.21, alpine) and VS Code extension versions (1.17.0, 1.19.0). Verify the integrity of downloaded artifacts and consider reverting to known clean versions if available. Monitor for suspicious activity related to credential usage and GitHub repository creations. Remove any compromised credentials and rotate secrets that may have been exposed. Follow updates from Checkmarx and trusted security sources for official remediation steps.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://socket.dev/blog/checkmarx-supply-chain-compromise"]
- Adversary
- TeamPCP
- Pulse Id
- 69e9526908d4b6c7e9c97fed
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip94.154.172.43 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hashd47de3772f2d61a043e7047431ef4cf4 | — | |
hashe1023db24a29ab0229d99764e2c8deba | — | |
hash250f3633529457477a9f8fd3db3472e94383606a | — | |
hash2b12cc5cc91ec483048abcbd6d523cdc9ebae3f3 | — | |
hashbbbca2ddaa5d8feaa63e36b76fdaad77386f024f | — | |
hashde0fac2e4500dabe0009e67214ff5f5447ce83dd | — | |
hash222e6bfed0f3bb1937bf5e719a2342871ccd683ff1c0cb967c8e31ea58beaf7b | — | |
hash24680027afadea90c7c713821e214b15cb6c922e67ac01109fb1edb3ee4741d9 | — | |
hash2588a44890263a8185bd5d9fadb6bc9220b60245dbcbc4da35e1b62a6f8c230d | — | |
hash26e8e9c5e53c972997a278ca6e12708b8788b70575ca013fd30bfda34ab5f48f | — | |
hash2a6a35f06118ff7d61bfd36a5788557b695095e7c9a609b4a01956883f146f50 | — | |
hash415610a42c5b51347709e315f5efb6fffa588b6ebc1b95b24abf28088347791b | — | |
hash7391b531a07fccbbeaf59a488e1376cfe5b27aef757430a36d6d3a087c610322 | — | |
hasha0d9366f6f0166dcbf92fcdc98e1a03d2e6210e8d7e8573f74d50849130651a0 | — | |
hasha6871deb0480e1205c1daff10cedf4e60ad951605fd1a4efaca0a9c54d56d1cb | — | |
hashd186161ae8e33cd7702dd2a6c0337deb14e2b178542d232129c0da64b1af06e4 | — | |
hashff7b0f114f87c67402dfc2459bb3d8954dd88e537b0e459482c04cffa26c1f07 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://audit.checkmarx.cx/v1/telemetry | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainaudit.checkmarx.cx | — |
Threat ID: 69e9e0fb87115cfb68ecdc71
Added to database: 4/23/2026, 9:06:03 AM
Last enriched: 4/23/2026, 9:21:32 AM
Last updated: 4/24/2026, 6:10:28 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.