Docker details two recent supply chain attacks on Docker Hub — first Trivy, then Checkmarx KICS — where stolen publisher credentials were used to push malicious container images through legitimate publishing flows. In the KICS incident, seven tags were overwritten or created with poisoned images that silently exfiltrated scan output (containing secrets, credentials, and cloud topology) to attacker-controlled infrastructure. Docker caught the breach within ~30 minutes via provenance correlation, quarantined the repository, and coordinated response with Socket and Checkmarx. The post outlines remediation steps for affected users, explains why the bar for this class of attack has dropped dramatically, and argues that layered defenses and real-time cross-organization signal sharing are now essential. Docker also highlights its Hardened Images catalog as structurally resistant to this attack pattern.
Table of contents
Catching the KICS push: what happened, and the case for open, fast collaborationWhat happenedHow we caught this breachThe bar for this kind of attack has collapsedA note on where this is structurally harderNo one catches this aloneSort: