AIGovHub
Vendor Tracker
CCM PlatformSentinelProductsPricing
AIGovHub

The AI Compliance & Trust Stack Knowledge Engine. Helping companies become AI Act-ready.

Tools

  • AI Act Checker
  • Questionnaire Generator
  • Vendor Tracker

Resources

  • Blog
  • Guides
  • Best Tools

Company

  • About
  • Pricing
  • How We Evaluate
  • Contact

Legal

  • Privacy Policy
  • Terms of Service
  • Affiliate Disclosure

© 2026 AIGovHub. All rights reserved.

Some links on this site are affiliate links. See our disclosure.

Supply Chain Attack 2026: Checkmarx KICS Breach and Open VSX Malware – NIS2 & DORA Compliance Lessons
supply chain attack 2026
Checkmarx KICS breach
Open VSX malware
NIS2 supply chain compliance
DORA ICT risk management
GlassWorm
software supply chain security
compliance

Supply Chain Attack 2026: Checkmarx KICS Breach and Open VSX Malware – NIS2 & DORA Compliance Lessons

AIGovHub EditorialApril 30, 20260 views

Introduction: A New Era of Supply Chain Attacks

In April 2026, the software supply chain suffered two sophisticated attacks that exploited trust in open-source ecosystems and CI/CD pipelines. The Checkmarx KICS breach trojanized Docker images and IDE extensions to steal developer credentials, while the GlassWorm malware infiltrated the Open VSX marketplace through over 70 cloned extensions. These incidents underscore the urgency of supply chain attack 2026 preparedness and highlight the need for robust compliance with NIS2 supply chain compliance and DORA ICT risk management requirements.

This article dissects both attacks, their implications for regulated entities, and provides a compliance roadmap for organizations operating under EU and US frameworks.

Incident 1: Checkmarx KICS Trojanized Docker Image

On April 22, 2026, between 14:17:59 and 15:41:31 UTC, attackers compromised Checkmarx's KICS (Keeping Infrastructure as Code Secure) tool. They trojanized the official KICS Docker image and corresponding VS Code and Open VSX extensions. The malware targeted developer environments, exfiltrating:

  • GitHub tokens
  • Cloud credentials (AWS, Azure, GCP)
  • npm tokens
  • SSH keys
  • Environment variables

Data was exfiltrated to a domain impersonating Checkmarx, and the malware automatically created public GitHub repositories for data theft. The TeamPCP hacking group claimed responsibility, though attribution remains unconfirmed. Checkmarx has since restored legitimate images (DockerHub KICS v2.1.20, VS Code extensions v2.64.0) and revoked exposed credentials. Users are advised to rotate all secrets and block malicious domains.

Incident 2: GlassWorm Malware via Open VSX Extension Clones

Socket researchers identified over 70 cloned Open VSX extensions linked to the GlassWorm malware. First observed in October 2025, GlassWorm uses Unicode variation selectors to hide code and Solana blockchain for command-and-control (C&C). The new wave, published in April 2026, consists of sleeper clones—extensions that impersonate popular tools with identical icons and descriptions but different publishers. At least six have been activated, delivering payloads via bundled binaries or remote retrieval. The malware targets GitHub, Git, NPM credentials, and cryptocurrency wallets.

This attack pattern evades detection by shifting critical logic outside scanned source code, making it a potent threat for organizations relying on open-source components.

Impact on Regulated Entities

These attacks have direct implications for organizations subject to NIS2 and DORA regulations:

  • NIS2 supply chain compliance: Essential and important entities must implement risk management measures for their supply chains, including software development tools and open-source dependencies. The Checkmarx and Open VSX incidents demonstrate how a single compromised component can cascade across multiple organizations.
  • DORA ICT risk management: Financial entities must manage ICT third-party risk, including cloud services and development platforms. The exfiltration of cloud credentials (AWS, Azure, GCP) could lead to operational disruptions and data breaches, triggering DORA incident reporting requirements.

Both attacks also raise concerns under GDPR (data breach notification) and SEC cybersecurity disclosure rules (material incident reporting within 4 business days).

Compliance Steps for NIS2 and DORA

NIS2 Supply Chain Compliance

  1. Conduct supply chain risk assessments: Map all software components, including CI/CD tools, Docker images, and IDE extensions. Prioritize high-risk suppliers.
  2. Implement security measures for development environments: Enforce multi-factor authentication, network segmentation, and least-privilege access for developer endpoints.
  3. Monitor for compromised components: Use software composition analysis (SCA) tools and maintain an inventory of open-source dependencies. Subscribe to vulnerability feeds and CISA's Known Exploited Vulnerabilities (KEV) catalog.
  4. Establish incident reporting procedures: NIS2 requires early warning within 24 hours and full notification within 72 hours. Ensure your team can detect and report supply chain breaches promptly.

DORA ICT Risk Management

  1. Manage ICT third-party risk: Register all critical ICT suppliers (e.g., cloud providers, CI/CD platforms). Perform due diligence and contractual oversight.
  2. Test digital operational resilience: Include threat-led penetration testing and scenario analysis for supply chain attacks. Test ability to recover from compromised development tools.
  3. Implement incident detection and response: Deploy behavioral monitoring for anomalous activities in development environments. Use tools that detect unauthorized data exfiltration.
  4. Report incidents to competent authorities: DORA requires financial entities to report major ICT-related incidents. The Checkmarx breach could qualify if it leads to service disruption or data loss.

Vendor Comparison: Security Practices for Supply Chain Protection

VendorKey CapabilitiesRelevance to AttacksPricing
SnykSCA, container security, IDE integration, real-time vulnerability scanningDetects known vulnerabilities in Docker images and open-source packages; can flag malicious packagesFree tier available; paid plans start from $25/user/month (as of 2026)
WizCloud security, container image scanning, CI/CD pipeline integration, runtime detectionIdentifies trojanized images and misconfigurations; monitors for suspicious runtime behaviorContact sales for pricing (as of 2026)
CrowdStrikeEndpoint detection and response (EDR), threat intelligence, Falcon OverWatch managed huntingDetects malware like GlassWorm on endpoints; provides threat intelligence on threat actorsStarting from $99.95/device/year (as of 2026)
SocketSupply chain security for npm/PyPI, package behavior analysis, dependency risk scoringIdentified the GlassWorm clones; blocks malicious packages before installationFree for open-source; paid plans available

Organizations should adopt a layered approach combining SCA (Snyk), cloud security (Wiz), and endpoint detection (CrowdStrike). For geopolitical and supply chain risk monitoring, platforms like AIGovHub SENTINEL provide real-time intelligence across 435+ sources, including CISA and OFAC, helping organizations anticipate and respond to emerging threats.

Key Takeaways

  • The Checkmarx KICS breach (April 22, 2026) and GlassWorm Open VSX malware (April 2026) highlight the vulnerability of developer tools and open-source marketplaces.
  • Regulated entities under NIS2 and DORA must strengthen supply chain risk management, incident detection, and third-party oversight.
  • Immediate actions include rotating compromised credentials, blocking malicious domains, and verifying the integrity of Docker images and IDE extensions.
  • Adopt a multi-vendor security stack combining SCA, cloud security, and EDR, and supplement with geopolitical intelligence for proactive threat monitoring.

This content is for informational purposes only and does not constitute legal advice.