Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

820+ Articles
121+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack
Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack
NEWS

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

Checkmarx has confirmed that data from its GitHub repositories has been published on the dark web following an investigation into the March 23 supply chain security incident. The breach is linked to the same campaign that compromised KICS Docker images and VS Code extensions targeting developers.

Dylan H.

News Desk

April 27, 2026
4 min read

Checkmarx, a leading application security testing platform trusted by thousands of enterprises worldwide, has confirmed that data originating from its GitHub repositories has been posted on the dark web following the investigation into a March 23, 2026 supply chain security incident.

In an updated statement published this week, Checkmarx said: "Based on current evidence, we believe this data originated from Checkmarx's GitHub repository, and that access was obtained during the March 23 incident."

Background: The March 23 Supply Chain Attack

The March 23 incident was part of a broader supply chain campaign that security researchers subsequently linked to malicious KICS Docker images and compromised VS Code extensions. Checkmarx's KICS (Keeping Infrastructure as Code Secure) is an open-source static analysis tool widely used in DevSecOps pipelines to scan infrastructure-as-code files for misconfigurations.

Researchers at several security firms identified that a threat actor had managed to push malicious versions of KICS-related Docker images to public registries. These images contained embedded backdoors designed to exfiltrate environment variables, credentials, and repository contents from CI/CD environments where the images were executed.

The VS Code extension component of the campaign targeted developers who had installed certain security-focused extensions from the VS Code marketplace, some of which were compromised through credential theft from the extension publishers' accounts.

What Was Exposed

Checkmarx confirmed that the dark web posting contains data it believes originated from its GitHub repositories, but stated that its investigation is ongoing. The company has not provided a complete inventory of what was included in the leaked data.

Based on analysis of the posting by third-party threat intelligence researchers, the data reportedly includes:

  • Internal source code files and configuration samples
  • Documentation and internal tooling scripts
  • Commit history metadata including contributor information
  • Portions of internal CI/CD pipeline configurations

Checkmarx stated it has found no evidence that customer scan results, vulnerability reports, or application source code submitted by customers for analysis was included in the leaked data. The company is working with external forensic investigators to validate this assessment.

Scope of Impact

The broader supply chain campaign affected multiple organizations that integrated KICS or related Checkmarx tooling into their development workflows. Security teams at affected organizations were advised to:

  • Audit CI/CD pipeline logs for execution of compromised KICS Docker image versions
  • Rotate all credentials and secrets present in environments where the compromised images executed
  • Review any VS Code extension permissions granted in developer environments
  • Check for unexpected outbound network connections from build environments

The window of exposure for the malicious Docker images ran from approximately March 18 through March 24, when Checkmarx and registry operators took action to remove the compromised versions.

Threat Actor Attribution

Attribution for the campaign remains uncertain. The technical characteristics of the attack — including the use of compromised publisher credentials, the targeting of security tooling to maximize downstream reach, and the data exfiltration methodology — are consistent with tactics used by several threat groups active in supply chain operations.

Some researchers have noted overlaps with infrastructure previously associated with campaigns targeting open-source security tools, though no definitive attribution has been made public.

Checkmarx Response

Checkmarx stated it is:

  • Conducting a comprehensive review of access controls on its GitHub repositories and publishing infrastructure
  • Enhancing monitoring across its software supply chain
  • Engaging with customers to provide guidance on assessing their own exposure
  • Cooperating with law enforcement agencies investigating the incident

The company said it will provide further updates as the investigation progresses.

Broader Supply Chain Implications

The Checkmarx incident illustrates a pattern that has become increasingly common: threat actors targeting security vendors and tooling providers specifically because compromising these systems provides a force-multiplier effect. A breach of an application security tool potentially grants access to vulnerability data and code from every customer organization that uses the platform.

Organizations should treat any third-party security tooling with the same scrutiny applied to other dependencies, including verifying image digests, monitoring for unexpected behavior in build environments, and maintaining rollback capabilities for pipeline tooling.

#Supply Chain#Data Breach#Checkmarx#GitHub#Dark Web

Related Articles

Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

The popular Bitwarden CLI password manager package @bitwarden/cli@2026.4.0 was compromised as part of an ongoing Checkmarx supply chain campaign, with researchers at JFrog and Socket identifying the malicious version on npm.

6 min read

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

Zscaler ThreatLabz has uncovered a Tropic Trooper (APT23) campaign that delivers the AdaptixC2 post-exploitation beacon via trojanized SumatraPDF...

4 min read

Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain

Threat actors hijacked the official checkmarx/kics Docker Hub repository by overwriting existing image tags — including v2.1.20 and alpine variants — and...

4 min read
Back to all News