Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Malicious Artifacts Found in Official KICS Docker Repository and Code Extensions

0
Medium
Published: Wed Apr 22 2026 (04/22/2026, 22:57:45 UTC)
Source: AlienVault OTX General

Description

Docker and Socket uncovered a supply chain compromise affecting Checkmarx KICS distribution channels. Attackers poisoned official Docker Hub images (tags v2.1.20, v2.1.21, alpine) and VS Code extensions (versions 1.17.0, 1.19.0), introducing unauthorized data exfiltration capabilities. The trojanized KICS binary collects and encrypts scan reports containing credentials from infrastructure-as-code files, transmitting them to external endpoints. Compromised VS Code extensions download mcpAddon.js via Bun runtime, harvesting GitHub tokens, AWS credentials, Azure tokens, npm configurations, and SSH keys. The malware creates public GitHub repositories for staging stolen data, injects malicious GitHub Actions workflows to capture repository secrets, and uses stolen npm credentials to identify writable packages for propagation. TeamPCP appears to claim responsibility for this multi-stage attack designed to steal developer credentials and propagate through CI/CD pipelines.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/23/2026, 09:21:32 UTC

Technical Analysis

This threat involves a supply chain attack targeting Checkmarx KICS distribution channels via poisoned official Docker Hub images and VS Code extensions. The malicious artifacts enable unauthorized data exfiltration by collecting credentials from infrastructure-as-code scan reports and developer environments. The malware leverages the Bun runtime to download additional malicious scripts that harvest a wide range of credentials including GitHub tokens, cloud service tokens, npm credentials, and SSH keys. It further propagates by creating public GitHub repositories to stage stolen data and injecting malicious GitHub Actions workflows to capture secrets from repositories. The attack also attempts to propagate through npm packages using stolen credentials. The adversary identified is TeamPCP, and the attack is designed to compromise CI/CD pipelines and developer environments.

Potential Impact

The compromise results in unauthorized exfiltration of sensitive credentials including GitHub tokens, AWS and Azure tokens, npm credentials, and SSH keys. This can lead to further compromise of developer environments, CI/CD pipelines, and cloud resources. The malware's ability to create public repositories and inject malicious workflows increases the risk of widespread credential theft and propagation within software supply chains. The attack undermines trust in official Checkmarx KICS Docker images and VS Code extensions, potentially impacting organizations relying on these tools for infrastructure-as-code security scanning.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until official fixes or updates are released, users should avoid using the affected Docker image tags (v2.1.20, v2.1.21, alpine) and VS Code extension versions (1.17.0, 1.19.0). Verify the integrity of downloaded artifacts and consider reverting to known clean versions if available. Monitor for suspicious activity related to credential usage and GitHub repository creations. Remove any compromised credentials and rotate secrets that may have been exposed. Follow updates from Checkmarx and trusted security sources for official remediation steps.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://socket.dev/blog/checkmarx-supply-chain-compromise"]
Adversary
TeamPCP
Pulse Id
69e9526908d4b6c7e9c97fed
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip94.154.172.43

Hash

ValueDescriptionCopy
hashd47de3772f2d61a043e7047431ef4cf4
hashe1023db24a29ab0229d99764e2c8deba
hash250f3633529457477a9f8fd3db3472e94383606a
hash2b12cc5cc91ec483048abcbd6d523cdc9ebae3f3
hashbbbca2ddaa5d8feaa63e36b76fdaad77386f024f
hashde0fac2e4500dabe0009e67214ff5f5447ce83dd
hash222e6bfed0f3bb1937bf5e719a2342871ccd683ff1c0cb967c8e31ea58beaf7b
hash24680027afadea90c7c713821e214b15cb6c922e67ac01109fb1edb3ee4741d9
hash2588a44890263a8185bd5d9fadb6bc9220b60245dbcbc4da35e1b62a6f8c230d
hash26e8e9c5e53c972997a278ca6e12708b8788b70575ca013fd30bfda34ab5f48f
hash2a6a35f06118ff7d61bfd36a5788557b695095e7c9a609b4a01956883f146f50
hash415610a42c5b51347709e315f5efb6fffa588b6ebc1b95b24abf28088347791b
hash7391b531a07fccbbeaf59a488e1376cfe5b27aef757430a36d6d3a087c610322
hasha0d9366f6f0166dcbf92fcdc98e1a03d2e6210e8d7e8573f74d50849130651a0
hasha6871deb0480e1205c1daff10cedf4e60ad951605fd1a4efaca0a9c54d56d1cb
hashd186161ae8e33cd7702dd2a6c0337deb14e2b178542d232129c0da64b1af06e4
hashff7b0f114f87c67402dfc2459bb3d8954dd88e537b0e459482c04cffa26c1f07

Url

ValueDescriptionCopy
urlhttps://audit.checkmarx.cx/v1/telemetry

Domain

ValueDescriptionCopy
domainaudit.checkmarx.cx

Threat ID: 69e9e0fb87115cfb68ecdc71

Added to database: 4/23/2026, 9:06:03 AM

Last enriched: 4/23/2026, 9:21:32 AM

Last updated: 4/24/2026, 6:10:28 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses