G6g9.putty PDocsCybersecurity
Related
How to Secure Your Linux System Against the Copy Fail Privilege Escalation VulnerabilityDarkSword: A State-Grade iOS Exploit Chain Spreads Across Threat ActorsJDownloader Supply Chain Attack: Official Site Distributes Python RAT to Windows, Linux Users7 Critical Facts About Google's Gemini CLI Patch: From CVSS 10 to Cursor FlawsGetting Started with Fedora Hummingbird: A Step-by-Step Guide to the Super Hardened Rolling ReleaseWhen the Perimeter Betrays: How Edge Decay Fuels Modern Cyber AttacksThe Retracted Instructure Breach Story: 10 Key TakeawaysUnderstanding Multi-Stage Cyber Attacks: The Final Fantasy Bosses of Cybersecurity

Checkmarx KICS Docker Hub Breach: Stolen Credentials Lead to Malicious Image Push; Users Urged to Rotate Credentials

Last updated: 2026-05-06 09:51:23 · Cybersecurity

Urgent: Malicious KICS Images on Docker Hub

On April 22, 2026, at approximately 12:35 UTC, a threat actor used stolen publisher credentials to push malicious images to the checkmarx/kics repository on Docker Hub. The attacker overwrote five existing tags and created two new ones, all containing a backdoor that exfiltrated scan output to attacker-controlled infrastructure at audit.checkmarx[.]cx.

Checkmarx KICS Docker Hub Breach: Stolen Credentials Lead to Malicious Image Push; Users Urged to Rotate Credentials
Source: www.docker.com

"This is the second supply chain compromise on Docker Hub in weeks, following the Trivy incident," said a Docker security spokesperson. "Neither incident involved a breach of Docker’s infrastructure; both relied on compromised publisher accounts."

What Happened

The attacker authenticated using valid Checkmarx credentials and pushed images built from an attacker-controlled source repository. The poisoned binary kept the legitimate scanning surface intact while adding a silent exfiltration path. Scan output was encrypted and sent out under the User-Agent KICS-Telemetry/2.0.

Because KICS scans Terraform, CloudFormation, Kubernetes, and similar configuration files, its output routinely contains secrets, credentials, cloud resource names, and internal topology. The exposure window is short but critical.

Affected Tags and Digests

Index manifest digests to treat as malicious:

  • For alpine, v2.1.20, v2.1.21: sha256:2588a44890263a8185bd5d9fadb6bc9220b60245dbcbc4da35e1b62a6f8c230d
  • For debian, v2.1.20-debian, v2.1.21-debian: sha256:222e6bfed0f3bb1937bf5e719a2342871ccd683ff1c0cb967c8e31ea58beaf7b
  • For latest: sha256:a0d9366f6f0166dcbf92fcdc98e1a03d2e6210e8d7e8573f74d50849130651a0

If your CI ran KICS against any repository with credentials in scope during the exposure window, rotate those credentials immediately. Re-pull checkmarx/kics by digest, not tag, and pin your CI to the digest to prevent future overwrites. Purge malicious digests from local caches, CI runners, and pull-through registries.

Checkmarx KICS Docker Hub Breach: Stolen Credentials Lead to Malicious Image Push; Users Urged to Rotate Credentials
Source: www.docker.com

Background

This attack follows the same pattern as the Trivy compromise on Docker Hub earlier in April 2026. In both cases, stolen publisher credentials were used to push malicious images through legitimate publishing flows. Docker’s infrastructure was not breached.

“The repeat pattern shows that attackers are actively targeting publisher accounts on container registries,” noted Maria Chen, a supply chain security analyst at CyberSecWatch. “Organizations must enforce multi-factor authentication, monitor for unexpected image pushes, and verify image integrity via digests.”

What This Means

The incident underscores the fragility of trust in container images. Even legitimate repositories can be weaponized if publisher credentials are stolen. Defenders need to invest in credential hygiene, anomaly detection for image pushes, and immutable reference by digest rather than tag.

“These attacks are a wake-up call,” said Chen. “Every team pulling open-source container images should assume that tags can be overwritten and treat every pull as a potential risk.”

Docker has stated it is working with Checkmarx to investigate the breach and has revoked the compromised credentials. Users are advised to monitor Docker Hub security advisories for updated guidance.