Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
    Cybersecurity

    Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

    adminBy adminApril 23, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Bitwarden CLI has been compromised as part of the newly discovered and ongoing Checkmarx supply chain campaign, according to new findings from JFrog and Socket.

    “The affected package version appears to be @bitwarden/cli@2026.4.0, and the malicious code was published in ‘bw1.js,’ a file included in the package contents,” the application security company said.

    “The attack appears to have leveraged a compromised GitHub Action in Bitwarden’s CI/CD pipeline, consistent with the pattern seen across other affected repositories in this campaign.”

    In a post on X, JFrog said the rogue version of the package “steals GitHub/npm tokens, .ssh, .env, shell history, GitHub Actions and cloud secrets, then exfiltrates the data to private domains and as GitHub commits.”

    Specifically, the malicious code is executed by means of a preinstall hook, resulting in the theft of local, CI, GitHub, and cloud secrets. The data is exfiltrated to the domain “audit.checkmarx[.]cx” and to a GitHub repository as a fallback if the primary method fails.

    The entire series of actions is listed below –

    • It launches a credential stealer that targets developer secrets, GitHub Actions environments, and artificial intelligence (AI) coding tool configurations, including Claude, Kiro, Cursor, Codex CLI, and Aider.
    • The stolen data is encrypted with AES-256-GCM and exfiltrated to audit.checkmarx[.]cx, a domain impersonating Checkmarx.
    • If GitHub tokens are found, the malware weaponizes them to inject malicious Actions workflows into repositories and extract CI/CD secrets.

    “A single developer with @bitwarden/cli@2026.4.0 installed can become the entry point for a broader supply chain compromise, with the attacker gaining persistent workflow injection access to every CI/CD pipeline the developer’s token can reach,” StepSecurity said.

    While the malicious version is no longer available for download from npm, Socket said the compromise follows the same GitHub Actions supply chain vector identified in the Checkmarx campaign.

    As part of the effort, threat actors have been found abusing stolen GitHub tokens to inject a new GitHub Actions workflow that captures secrets available to the workflow run, and uses harvested npm credentials to push malicious versions of the package to read the malware to downstream users.

    According to security researcher Adnan Khan, the threat actor is said to have used a malicious workflow to publish the malicious bitwarden CLI. “I believe this is the first time a package using NPM trusted publishing has been compromised,” Khan added.

    Bitwarden CLI Attack Chain | Source: OX Security

    It’s suspected that the threat actor known as TeamPCP is behind the latest attack aimed at Checkmarx. As of writing, TeamPCP’s X account has been suspended for violating the platform’s rules.

    OX Security, in a breakdown of the attack, said it identified the string “Shai-Hulud: The Third Coming” in the package, suggesting this could likely be the next phase of the supply chain attack campaign that came to light last year.

    Reference to the “Shai-Hulud: The Third Coming”

    “The latest Shai Hulud incident is just the latest in a long chain of threats targeting developers around the world. User data is being publicly exfiltrated to GitHub, often going undetected because security tools typically don’t flag data being sent there,” Moshe Siman Tov Bustan, Security Research Team Lead at OX Security, said.

    “This makes the risk significantly more dangerous: anyone searching GitHub can potentially find and access those credentials. At that point, sensitive data is no longer in the hands of a single threat actor – it’s exposed to anyone.”

    Like in the case of the Checkmarx incident, the stolen data is exfiltrated to public repositories created under victim accounts using a Dune-themed naming scheme in the same format “–-<3 digits>.”But in an interesting shift, the malware is also designed to quit execution on systems if their locale corresponds to Russia.

    “The shared tooling strongly suggests a connection to the same malware ecosystem, but the operational signatures differ in ways that complicate attribution,” Socket said. “This suggests either a different operator using shared infrastructure, a splinter group with stronger ideological motivations, or an evolution in the campaign’s public posture.”

    When reached for comment, Bitwarden confirmed the incident and said it stemmed from the compromise of its npm distribution mechanism following the Checkmarx supply chain attack, but emphasized that no end-user data was accessed as part of the attack. The entire statement shared with The Hacker News is reproduced verbatim below –

    The Bitwarden security team identified and contained a malicious package that was briefly distributed through the npm delivery path for @bitwarden/cli@2026.4.0 between 5:57 PM and 7:30 PM (ET) on April 22, 2026, in connection with a broader Checkmarx supply chain incident.

    The investigation found no evidence that end user vault data was accessed or at risk, or that production data or production systems were compromised. Once the issue was detected, compromised access was revoked, the malicious npm release was deprecated, and remediation steps were initiated immediately.

    The issue affected the npm distribution mechanism for the CLI during that limited window, not the integrity of the legitimate Bitwarden CLI codebase or stored vault data.

    Users who did not download the package from npm during that window were not affected. Bitwarden has completed a review of internal environments, release paths, and related systems, and no additional impacted products or environments have been identified at this time. A CVE for Bitwarden CLI version 2026.4.0 is being issued in connection with this incident. 

    (This is a developing story. Please check for more details.)

    Bitwarden Campaign Chain Checkmarx CLI Compromised ongoing Supply
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleRaspberry Pi projects to try this weekend (April 24
    Next Article Cisco switch aimed at building practical quantum networks
    admin
    • Website

    Related Posts

    In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

    April 24, 2026

    US Busts Myanmar Ring Targeting US Citizens in Financial Fraud

    April 24, 2026

    FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches

    April 24, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Take 50% off this beast of a router, plus get a free $80 Xbox gift card

    April 24, 2026

    Space data-center news: Roundup of extraterrestrial AI endeavors

    April 24, 2026

    In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

    April 24, 2026

    California Coastal Community Must Reject CBP’s AI-Powered Surveillance Tower

    April 24, 2026
    Categories
    • Blogging (68)
    • Cybersecurity (1,492)
    • Privacy & Online Earning (182)
    • SEO & Digital Marketing (917)
    • Tech Tools & Mobile / Apps (1,779)
    • WiFi / Internet & Networking (245)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Take 50% off this beast of a router, plus get a free $80 Xbox gift card

    April 24, 2026

    Space data-center news: Roundup of extraterrestrial AI endeavors

    April 24, 2026

    In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device

    April 24, 2026
    Most Popular
    • Take 50% off this beast of a router, plus get a free $80 Xbox gift card
    • Space data-center news: Roundup of extraterrestrial AI endeavors
    • In Other News: Unauthorized Mythos Access, Plankey CISA Nomination Ends, New Display Security Device
    • California Coastal Community Must Reject CBP’s AI-Powered Surveillance Tower
    • Why Microsoft’s AI Ad Strategy Deserves More Attention From PPC Managers
    • Amazon eero and Leo routers escape the FCC’s foreign router ban
    • US Busts Myanmar Ring Targeting US Citizens in Financial Fraud
    • How to track (and grow) AI engine citations
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.