The confidence-breaking attack: Docker images and VS Code extensions commit Checkmarx KICS to steal secrets

Published 4 min de lectura 80 reading

A supply chain commitment has hit a tool designed to improve security: Docker images and VS Code / Open VSX extensions from the Checkmarx KICS open scanner were cut to steal secrets from development environments. KICS, used locally to analyze infrastructure such as code, processes files and variables that often contain tokens, keys and sensitive configurations; turning that vector into primary target leaves equipment and organizations exposed to automatic leaks of credentials and internal architecture.

According to the public investigation of the incident and the announcement of the Checkmark itself, the attackers introduced a hidden component - referred to as a "MCP addon" - that was downloaded from a coded URL and brought a multi-stage module to locate, encrypt and exfilter data such as GitHub tokens, AWS / Azure / GCP credentials, tokens npm, SSH keys, Claude-type assistant configurations and environment variables. Part of the exfiltration was made to a domain that imitated the legitimate infrastructure of Checkmarx and through the automatic creation of public repositories in GitHub to store the stolen data.

The confidence-breaking attack: Docker images and VS Code extensions commit Checkmarx KICS to steal secrets
Image generated with IA.

The technical range includes two vectors: DockerHub tags that were temporarily rearranged to a malicious digest during a precise interval and IDE extensions that loaded the malicious addon. This means that the impact depends on when the images or extensions were downloaded; Checkmark restored the affected labels and removed the fake label, but the users who obtained them in that period must assume that their secrets were compromised.

The practical implications are serious. The exposure of tokens and keys from development machines can provide access to repositories, cloud deployments, package records and continuous integration environments, allowing for scaling, sensitive code leaks and back door deployments. In addition, attackers who exploit a security tool take advantage of the developer's confidence in that tool: the result is a high impact attack and low probability of immediate detection.

If you think you downloaded any of the affected versions, already. Check Checkmark's official security note for secure details and versions and follow your instructions: Checkmarx - Security update. As immediate measures, it considers revoking and rotating all potentially exposed credentials (GitHub tokens, cloud keys, tokens npm, SSH keys), rebuilding environments from confidence points and blocking connections to the domains and IP addresses associated with the exfilter. For instructions on how to cancel personal tokens and protect accounts in GitHub, see the official guide: GitHub - Revocar personal access tokens.

The confidence-breaking attack: Docker images and VS Code extensions commit Checkmarx KICS to steal secrets
Image generated with IA.

Beyond urgent remediation, this incident reinforces practices that must be integrated into any pipeline: pining of digests and versions in images and extensions, verification of integrity and signatures of artifacts, use of ephemeral and less-reaching credentials, and monitoring of the creation of repositories or unusual activity in linked accounts. Device signature tools such as Sigstore help raise confidence about which binaries and containers are consumed: Sigstore.

Not all attribution is firm: there were public claims that attempted to link the attack to groups responsible for previous incidents, but the open investigations did not confirm a final attribution. This lack of certainty highlights another lesson: not relying on a single layer of trust and assuming that any critical dependence can be attacked. For security equipment, this requires the incorporation of compensatory controls such as repository leak detection, continuous secret scanning and cloud access audit.

In short, take the threat seriously: revoke and break secrets, review and reconstruct environments, set images / extentions by SHAs and activate signatures or integrity verification. It takes advantage of this crisis in order to tighten the policies of the management of secrets and the hygiene of development: short-term credentials, minimum privileges, and telemetry to detect early anomalies are investments that reduce the exposure window when a tool of confidence is compromised.

Coverage

Related

More news on the same subject.