Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Malicious Supply Chain Attacks: The Dark Side of Software Updates




A recent incident involving malicious KICS Docker images and VS Code extensions has highlighted the need for robust security measures in software supply chains. Organizations that rely on software updates to secure their systems are advised to take proactive steps to protect themselves from potential breaches. In this article, we will explore the details of this incident and provide guidance on how organizations can mitigate the risk of supply chain attacks.



  • Malicious KICS Docker images and VS Code extensions were found to be vulnerable to data collection and exfiltration.
  • The breach has left organizations that use KICS to scan infrastructure-as-code files vulnerable to potential attacks.
  • A related Checkmarx developer tooling issue was discovered, including a malicious code in Microsoft Visual Studio Code extensions.
  • Organizations are advised to treat any secrets or credentials exposed by affected scans as likely compromised.
  • The incident highlights the need for robust security measures in software supply chains and regular monitoring of software repositories.
  • Additional security measures, such as encryption and secure communication protocols, should be implemented.
  • Developers must be trained to identify and report suspicious code or behavior, and organizations must have a clear incident response plan.



  • The threat landscape continues to evolve at an alarming rate, with new vulnerabilities and exploits emerging every day. Recently, a concerning incident involving malicious KICS Docker images and VS Code extensions has highlighted the need for robust security measures in software supply chains. In this article, we will delve into the details of this incident and explore its implications for organizations that rely on software updates to secure their systems.

    In an alert published earlier this month, Socket, a software supply chain security company, revealed that unknown threat actors had managed to overwrite existing tags in the official "checkmarx/kics" Docker Hub repository. The malicious images were found to contain data collection and exfiltration capabilities that were not present in the legitimate version of KICS. This breach has left many organizations that use KICS to scan infrastructure-as-code files vulnerable to potential attacks.

    Further analysis by Socket has uncovered that related Checkmarx developer tooling may also have been affected, including recent Microsoft Visual Studio Code extension releases that come with malicious code to download and run a remote addon through the Bun runtime. The behavior was present in versions 1.17.0 and 1.19.0, but was removed in 1.18.0, relying on a hardcoded GitHub URL to fetch and run additional JavaScript without user confirmation or integrity verification.

    The implications of this incident are far-reaching, with organizations that may have used the affected KICS image to scan Terraform, CloudFormation, or Kubernetes configurations advised to treat any secrets or credentials exposed to those scans as likely compromised. The evidence suggests that this is not an isolated Docker Hub incident, but part of a broader supply chain compromise affecting multiple Checkmarx distribution channels.

    This incident highlights the need for robust security measures in software supply chains. Organizations must take steps to ensure that their software updates are thoroughly vetted and tested before being released to the public. This includes regular monitoring of software repositories for suspicious activity and implementing robust patch management processes to quickly respond to any vulnerabilities that may be discovered.

    In addition, organizations should consider implementing additional security measures such as encryption and secure communication protocols to protect sensitive data from potential breaches. Furthermore, they should ensure that their developers are trained to identify and report any suspicious code or behavior, and that they have a clear incident response plan in place in the event of a breach.

    The use of threat intelligence is also crucial in identifying and mitigating the risk of supply chain attacks. Organizations must invest in threat intelligence tools and services to stay informed about emerging threats and vulnerabilities, and to receive real-time alerts and updates on potential breaches.

    In conclusion, the recent incident involving malicious KICS Docker images and VS Code extensions highlights the need for robust security measures in software supply chains. Organizations must take proactive steps to ensure that their software updates are thoroughly vetted and tested before being released, and should implement additional security measures such as encryption and secure communication protocols. The use of threat intelligence is also crucial in identifying and mitigating the risk of supply chain attacks.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Malicious-Supply-Chain-Attacks-The-Dark-Side-of-Software-Updates-ehn.shtml

  • https://thehackernews.com/2026/04/malicious-kics-docker-images-and-vs.html

  • https://socket.dev/blog/checkmarx-supply-chain-compromise

  • https://socket.dev/blog/namastex-npm-packages-compromised-canisterworm

  • https://vpncentral.com/compromised-namastex-npm-packages-spread-canisterworm-in-teampcp-style-supply-chain-attack/

  • https://attack.mitre.org/groups/

  • https://www.socinvestigation.com/comprehensive-list-of-apt-threat-groups-motives-and-attack-methods/


  • Published: Wed Apr 22 14:00:39 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us