Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Bitwarden CLI Hit by Supply Chain Attack via GitHub Actions

Bitwarden CLI Hit by Supply Chain Attack via GitHub Actions

Posted on April 23, 2026 By CWS

Bitwarden CLI version 2026.4.0 has been compromised as part of the Checkmarx supply chain attack, potentially risking the security of millions of users and numerous enterprises. This breach involved a malicious file, bw1.js, being inserted into the npm package, which is widely used by over 10 million users and more than 50,000 businesses.

Scope of the Attack

The infiltration specifically targeted the npm CLI package, leaving other distribution channels such as Bitwarden’s Chrome extension and MCP server unaffected. Attackers exploited a compromised GitHub Action in Bitwarden’s CI/CD pipeline, a vulnerability similar to those identified in the larger Checkmarx campaign by Socket researchers.

The malicious payload, bw1.js, shares infrastructure with the previously analyzed mcpAddon.js, including a command and control endpoint at audit.checkmarx[.]cx/v1/telemetry, disguised using a decoding function. This highlights the sophisticated nature of the attack.

Attack Methodology

The payload used a multi-stage architecture, targeting credential harvesting from various sources such as GitHub tokens, AWS credentials, Azure tokens, GCP credentials, npm tokens, and SSH keys. Additionally, it created public repositories on GitHub using thematic naming conventions and exfiltrated data through encrypted commits.

Propagation of the supply chain was achieved by stealing npm tokens to modify and republish packages with preinstall hooks. Furthermore, GitHub Actions workflows were injected to capture repository secrets, and shell persistence was maintained through payloads in shell profile files.

Indicators and Recommendations

This attack shows distinct characteristics, suggesting a possible divergence from previous Checkmarx campaigns. Descriptions and debug strings within the payload indicate ideological branding, potentially signaling a new or evolved threat actor.

Organizations that have used the compromised package should consider this a full credential exposure event. Immediate actions include removing the affected package, rotating exposed credentials, auditing GitHub for unauthorized activities, and monitoring for connections to the C2 endpoint.

Long-term measures should focus on reducing token exposure and hardening security configurations for GitHub Actions and other related systems.

Socket’s security team is actively investigating the full extent of the campaign. Until more information is available, any exposure to the compromised package should be treated as a confirmed security incident.

Cyber Security News Tags:Bitwarden, Checkmarx, CI/CD pipeline, cloud credentials, credential exposure, credential theft, Cybersecurity, enterprise security, GitHub actions, GitHub tokens, Malware, NPM, security incident, supply chain attack

Post navigation

Previous Post: Cybersecurity Threats: DeFi Hack & AI Vulnerabilities
Next Post: UNC6692 Uses Teams to Spread SNOW Malware

Related Posts

Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware Threat Actors Weaponizing YouTube Video Download Site to Download Proxyware Malware Cyber Security News
Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits Cyber Security News
Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed Cyber Security News
Fortinet FortiWeb Fabric Connector Vulnerability Exploited to Execute Remote Code Fortinet FortiWeb Fabric Connector Vulnerability Exploited to Execute Remote Code Cyber Security News
Fired Intel Engineer Stolen 18,000 Files Many of which Were Classified as “Top Secret” Fired Intel Engineer Stolen 18,000 Files Many of which Were Classified as “Top Secret” Cyber Security News
BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized BlackSuit Ransomware’s Data Leak and Negotiation Portal Seized Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Cyber Scheme Exploits IT Jobs Globally
  • AI-Enhanced Lazarus Campaign Targets Crypto Developers
  • UNC6692 Uses Teams to Spread SNOW Malware
  • Bitwarden CLI Hit by Supply Chain Attack via GitHub Actions
  • Cybersecurity Threats: DeFi Hack & AI Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Cyber Scheme Exploits IT Jobs Globally
  • AI-Enhanced Lazarus Campaign Targets Crypto Developers
  • UNC6692 Uses Teams to Spread SNOW Malware
  • Bitwarden CLI Hit by Supply Chain Attack via GitHub Actions
  • Cybersecurity Threats: DeFi Hack & AI Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark