Bitwarden CLI Compromised in Active Supply Chain Attack Targeting Developers

Security researchers have uncovered a serious supply chain attack affecting Bitwarden CLI, the command-line version of the popular open-source password manager. The compromised package was published to npm as part of a broader ongoing campaign linked to the threat actor group TeamPCP, previously connected to the Checkmarx supply chain attacks.

What Happened?

According to application security firm Socket, the affected package version was @bitwarden/cli@2026.4.0, where malicious code was injected into a file called bw1.js included in the published package. The attackers managed to push this rogue version by exploiting a compromised GitHub Actions workflow within Bitwarden's own CI/CD pipeline, the same attack vector identified in earlier Checkmarx campaign incidents.

Security firm JFrog confirmed that the malicious version was designed to steal a wide range of sensitive data, including GitHub and npm authentication tokens, SSH keys, environment files, shell history, GitHub Actions secrets, and cloud credentials. All of this data was then exfiltrated to attacker-controlled domains and even committed to GitHub repositories.

Why This Is Significant

Researchers noted this may be the first known case of a package using npm Trusted Publishing being successfully compromised in this way. Trusted Publishing is a mechanism intended to improve the security of automated package releases making this breach particularly notable from a supply chain security perspective.

The attack method followed a now-familiar pattern: stolen GitHub tokens were used to inject a new malicious GitHub Actions workflow that captured secrets during the build process, then used harvested npm credentials to push the poisoned package version directly to the npm registry, where it would be downloaded by unsuspecting developers.

Current Status

The malicious version of the package has since been removed from npm and is no longer available for download. The X (formerly Twitter) account of threat actor TeamPCP has also been suspended for violating platform rules.

This is a developing story and further details are expected as the investigation continues. If you use Bitwarden CLI in any automated pipeline or CI/CD environment, it is strongly recommended to audit your credentials and secrets that may have been exposed.

Resources

Comments

Popular posts from this blog

The Hidden Lag Killing Your SIEM Efficiency

Critical Vulnerability in Veeam Backup & Replication Exposes Enterprises to Remote Code Execution

Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware