Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Vercel announces some of its customers’ data was stolen before recent hack

Another customer of troubled startup Delve suffers a major security incident

Bitwarden CLI compromised in ongoing Checkmarx supply chain campaign

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Bitwarden CLI compromised in ongoing Checkmarx supply chain campaign
Identity

Bitwarden CLI compromised in ongoing Checkmarx supply chain campaign

By April 23, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

According to new findings from JFrog and Socket, the Bitwarden CLI was compromised as part of a newly discovered and ongoing Checkmarx supply chain campaign.

“The version of the affected package appears to be @bitwarden/cli@2026.4.0, and the malicious code was exposed in the file ‘bw1.js’ included in the package contents,” the application security company said.

“This attack appears to leverage a compromised GitHub action in Bitwarden’s CI/CD pipeline. This is consistent with the pattern seen across other repositories affected in this campaign.”

In a post on X, JFrog said the malicious version of the package “steals GitHub/npm tokens, .ssh, .env, shell history, GitHub Actions, cloud secrets, and leaks data to private domains on GitHub commits.”

Specifically, malicious code is executed by the preinstallation hook and steals local, CI, GitHub, and cloud secrets. The data is leaked to the domain “audit.checkmarx”.[.]cx’ and submit to a GitHub repository as a fallback if the main method fails.

The entire sequence of actions is shown below.

Launches a credential stealer that targets artificial intelligence (AI) coding tool configurations such as Developer Secrets, GitHub Actions environments, Claude, Kiro, Cursor, Codex CLI, and Aider. The stolen data is encrypted with AES-256-GCM and exposed to audit.checkmarx.[.]cx, a domain impersonating Checkmarx. Once the GitHub token is found, the malware can use it as a weapon to inject malicious action workflows into the repository and extract CI/CD secrets.

“A single developer with @bitwarden/cli@2026.4.0 installed could become an entry point for a widespread supply chain compromise, with the attacker gaining persistent workflow injection access to all CI/CD pipelines that the developer’s token can reach,” StepSecurity said.

Although this malicious version is no longer available for download from npm, Socket said the breach follows the same GitHub Actions supply chain vectors identified in the Checkmarx campaign.

As part of this effort, we observed threat actors exploiting stolen GitHub tokens to inject new GitHub Actions workflows that capture secrets that can be used to run workflows, and using the harvested npm credentials to push malicious versions of packages that read and send malware to downstream users.

According to security researcher Adnan Khan, the attackers allegedly used a malicious workflow to expose the malicious bitwarden CLI. “I believe this is the first time a package using NPM’s trusted publications has been compromised,” Khan added.

Bitwarden CLI Attack Chain |Source: OX Security

The latest attack targeting Checkmarx is suspected to involve an attacker known as TeamPCP. As of this writing, TeamPCP’s X account has been suspended for violating the platform’s rules.

In a breakdown of the attack, OX Security said it identified the string “Shai-Hulud: The Third Coming” within the package, suggesting this may be the next stage in a supply chain attack campaign that was uncovered last year.

References to “Shai Hurd: The Third Coming”

“The latest Shai Hulud incident is just the latest in a long chain of threats targeting developers around the world. User data is publicly exposed on GitHub, but it often goes undetected because security tools typically do not flag data sent there,” said Moshe Siman Tov Bustan, Security Research Team Lead at OX Security.

“This makes the risk much more dangerous. Anyone searching GitHub could potentially find and access those credentials. At that point, sensitive data is no longer in the hands of a single threat actor, but exposed to everyone.”

As in the Checkmarx case, the stolen data is in the same format “–<3 桁>” using a Dune-themed naming scheme to a public repository created under the victim’s account. However, in an interesting twist, the malware is also designed to terminate execution on the system if the locale corresponds to Russia.

“While the shared tools strongly suggest a connection to the same malware ecosystem, the operational signatures differ in some ways, complicating attribution,” Socket said. “This suggests either a different operator using shared infrastructure, a splinter group with stronger ideological motivations, or an evolution in the campaign’s public stance.”

When asked for comment, Bitwarden acknowledged the incident and said it resulted from a compromise of the npm distribution mechanism following the Checkmarx supply chain attack, but stressed that it did not access end-user data as part of the attack. The entire statement shared with The Hacker News is reproduced verbatim below.

The Bitwarden security team has identified and contained a malicious package that was briefly distributed through the npm delivery path @bitwarden/cli@2026.4.0 between 5:57 PM and 7:30 PM ET on April 22, 2026, in connection with the broader Checkmarx supply chain incident.

The investigation found no evidence that end users’ vault data was accessed or compromised, or that operational data or systems were compromised. Once the issue was detected, compromised access was revoked, the malicious npm release was deprecated, and remediation steps were initiated immediately.

This issue did not impact the canonical Bitwarden CLI codebase or the integrity of the stored Vault data, but rather the CLI’s npm distribution mechanism for a limited period of time.

Users who did not download packages from npm during that period were not affected. Bitwarden has completed a review of its internal environment, release path, and related systems and has not identified any additional products or environments that are affected at this time. A CVE has been issued for Bitwarden CLI version 2026.4.0 in connection with this incident.

(This is a developing story. Check back for more details.)


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTesla drops Musk’s $29 billion ‘interim’ compensation after Delaware court reinstates larger compensation package
Next Article Another customer of troubled startup Delve suffers a major security incident

Related Posts

$290M DeFi Hack, macOS LoL Abuse, ProxySmart SIM Farms +25 New Stories

April 23, 2026

Defeat automated exploits at the speed of AI

April 23, 2026

Project Glasswing proved that AI can find bugs. Who will fix it?

April 23, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Vercel announces some of its customers’ data was stolen before recent hack

Another customer of troubled startup Delve suffers a major security incident

Bitwarden CLI compromised in ongoing Checkmarx supply chain campaign

Tesla drops Musk’s $29 billion ‘interim’ compensation after Delaware court reinstates larger compensation package

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.