Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Bitwarden CLI Hit by Supply Chain Attack via GitHub Actions

Bitwarden CLI Hit by Supply Chain Attack via GitHub Actions

Posted on April 23, 2026 By CWS

Bitwarden CLI version 2026.4.0 has been compromised as part of the Checkmarx supply chain attack, potentially risking the security of millions of users and numerous enterprises. This breach involved a malicious file, bw1.js, being inserted into the npm package, which is widely used by over 10 million users and more than 50,000 businesses.

Scope of the Attack

The infiltration specifically targeted the npm CLI package, leaving other distribution channels such as Bitwarden’s Chrome extension and MCP server unaffected. Attackers exploited a compromised GitHub Action in Bitwarden’s CI/CD pipeline, a vulnerability similar to those identified in the larger Checkmarx campaign by Socket researchers.

The malicious payload, bw1.js, shares infrastructure with the previously analyzed mcpAddon.js, including a command and control endpoint at audit.checkmarx[.]cx/v1/telemetry, disguised using a decoding function. This highlights the sophisticated nature of the attack.

Attack Methodology

The payload used a multi-stage architecture, targeting credential harvesting from various sources such as GitHub tokens, AWS credentials, Azure tokens, GCP credentials, npm tokens, and SSH keys. Additionally, it created public repositories on GitHub using thematic naming conventions and exfiltrated data through encrypted commits.

Propagation of the supply chain was achieved by stealing npm tokens to modify and republish packages with preinstall hooks. Furthermore, GitHub Actions workflows were injected to capture repository secrets, and shell persistence was maintained through payloads in shell profile files.

Indicators and Recommendations

This attack shows distinct characteristics, suggesting a possible divergence from previous Checkmarx campaigns. Descriptions and debug strings within the payload indicate ideological branding, potentially signaling a new or evolved threat actor.

Organizations that have used the compromised package should consider this a full credential exposure event. Immediate actions include removing the affected package, rotating exposed credentials, auditing GitHub for unauthorized activities, and monitoring for connections to the C2 endpoint.

Long-term measures should focus on reducing token exposure and hardening security configurations for GitHub Actions and other related systems.

Socket’s security team is actively investigating the full extent of the campaign. Until more information is available, any exposure to the compromised package should be treated as a confirmed security incident.

Cyber Security News Tags:Bitwarden, Checkmarx, CI/CD pipeline, cloud credentials, credential exposure, credential theft, Cybersecurity, enterprise security, GitHub actions, GitHub tokens, Malware, NPM, security incident, supply chain attack

Post navigation

Previous Post: Cybersecurity Threats: DeFi Hack & AI Vulnerabilities
Next Post: UNC6692 Uses Teams to Spread SNOW Malware

Related Posts

Critical Flaw in WordPress Plugin Risks Site Security Critical Flaw in WordPress Plugin Risks Site Security Cyber Security News
GitHub Enhances NPM’s Security with Strict Authentication, Granular Tokens, and  Trusted Publishing GitHub Enhances NPM’s Security with Strict Authentication, Granular Tokens, and  Trusted Publishing Cyber Security News
Pig-Butchering Scams Operators Scaled Their Operations with The Support of AI-Assistants Pig-Butchering Scams Operators Scaled Their Operations with The Support of AI-Assistants Cyber Security News
WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack Cyber Security News
2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now Cyber Security News
New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories New AWS Console Supply Chain Attack Lets Attackers Hijack AWS GitHub Repositories Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI-Enhanced Lazarus Campaign Targets Crypto Developers
  • UNC6692 Uses Teams to Spread SNOW Malware
  • Bitwarden CLI Hit by Supply Chain Attack via GitHub Actions
  • Cybersecurity Threats: DeFi Hack & AI Vulnerabilities
  • Tropic Trooper Cyberattack Uses Novel Tools for Infiltration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI-Enhanced Lazarus Campaign Targets Crypto Developers
  • UNC6692 Uses Teams to Spread SNOW Malware
  • Bitwarden CLI Hit by Supply Chain Attack via GitHub Actions
  • Cybersecurity Threats: DeFi Hack & AI Vulnerabilities
  • Tropic Trooper Cyberattack Uses Novel Tools for Infiltration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark