Gbuck12DocsCybersecurity
Related
Build a Motorized Three-Axis Camera Slider Using Recycled 3D Printer PartsBrazilian Hackers Return After Three-Year Hiatus to Target Minecraft GamersCanisterWorm Wiper Campaign: TeamPCP Targets Iranian Cloud InfrastructureSafeguarding Identities in the Age of AI Agents: A Q&A with Nancy WangCVE-2023-33538: Command Injection Attacks Target TP-Link Routers with Mirai Botnet PayloadsRansomware in 2025: 7 Key Trends and Tactics Reshaping the Threat Landscape10 Key Revelations About the UNKN Ransomware Mastermind Behind REvil and GandCrabTrellix Source Code Breach: Key Questions and Expert Answers

Checkmarx KICS Docker Hub Breach: Stolen Credentials Lead to Malicious Image Push; Users Urged to Rotate Credentials

Last updated: 2026-05-06 09:51:23 · Cybersecurity

Urgent: Malicious KICS Images on Docker Hub

On April 22, 2026, at approximately 12:35 UTC, a threat actor used stolen publisher credentials to push malicious images to the checkmarx/kics repository on Docker Hub. The attacker overwrote five existing tags and created two new ones, all containing a backdoor that exfiltrated scan output to attacker-controlled infrastructure at audit.checkmarx[.]cx.

Checkmarx KICS Docker Hub Breach: Stolen Credentials Lead to Malicious Image Push; Users Urged to Rotate Credentials
Source: www.docker.com

"This is the second supply chain compromise on Docker Hub in weeks, following the Trivy incident," said a Docker security spokesperson. "Neither incident involved a breach of Docker’s infrastructure; both relied on compromised publisher accounts."

What Happened

The attacker authenticated using valid Checkmarx credentials and pushed images built from an attacker-controlled source repository. The poisoned binary kept the legitimate scanning surface intact while adding a silent exfiltration path. Scan output was encrypted and sent out under the User-Agent KICS-Telemetry/2.0.

Because KICS scans Terraform, CloudFormation, Kubernetes, and similar configuration files, its output routinely contains secrets, credentials, cloud resource names, and internal topology. The exposure window is short but critical.

Affected Tags and Digests

Index manifest digests to treat as malicious:

  • For alpine, v2.1.20, v2.1.21: sha256:2588a44890263a8185bd5d9fadb6bc9220b60245dbcbc4da35e1b62a6f8c230d
  • For debian, v2.1.20-debian, v2.1.21-debian: sha256:222e6bfed0f3bb1937bf5e719a2342871ccd683ff1c0cb967c8e31ea58beaf7b
  • For latest: sha256:a0d9366f6f0166dcbf92fcdc98e1a03d2e6210e8d7e8573f74d50849130651a0

If your CI ran KICS against any repository with credentials in scope during the exposure window, rotate those credentials immediately. Re-pull checkmarx/kics by digest, not tag, and pin your CI to the digest to prevent future overwrites. Purge malicious digests from local caches, CI runners, and pull-through registries.

Checkmarx KICS Docker Hub Breach: Stolen Credentials Lead to Malicious Image Push; Users Urged to Rotate Credentials
Source: www.docker.com

Background

This attack follows the same pattern as the Trivy compromise on Docker Hub earlier in April 2026. In both cases, stolen publisher credentials were used to push malicious images through legitimate publishing flows. Docker’s infrastructure was not breached.

“The repeat pattern shows that attackers are actively targeting publisher accounts on container registries,” noted Maria Chen, a supply chain security analyst at CyberSecWatch. “Organizations must enforce multi-factor authentication, monitor for unexpected image pushes, and verify image integrity via digests.”

What This Means

The incident underscores the fragility of trust in container images. Even legitimate repositories can be weaponized if publisher credentials are stolen. Defenders need to invest in credential hygiene, anomaly detection for image pushes, and immutable reference by digest rather than tag.

“These attacks are a wake-up call,” said Chen. “Every team pulling open-source container images should assume that tags can be overwritten and treat every pull as a potential risk.”

Docker has stated it is working with Checkmarx to investigate the breach and has revoked the compromised credentials. Users are advised to monitor Docker Hub security advisories for updated guidance.