Bitwarden NPM Package Compromised in Recent Supply Chain Cyberattack
Supply Chain Attack Compromises Bitwarden CLI Package, Exfiltrates Credentials and Secrets
A critical vulnerability was discovered in the Bitwarden Command-Line Interface (CLI) package on npm, a popular open-source password management platform.
- The vulnerability allowed attackers to exfiltrate sensitive information, including credentials and secrets, from victim machines.
- The compromised package, version 2026.4.0, was specifically designed to target users who installed the package, allowing the attackers to fetch a JavaScript payload that stole credentials and secrets from victims’ machines.
The attack is linked to a recent supply chain attack on Checkmarx, which compromised the company’s public DockerHub KICS image, public ast-github-action, VS Code extension, and Developer Assist extension. The malware used in the attack was designed to harvest credentials and exfiltrate them to the checkmarx.cx domain or to repositories created under the victim’s GitHub account, a pattern used in the Bitwarden supply chain attack as well.
Socket’s analysis of the two incidents revealed the use of the same embedded payload structure, credential harvesting method, propagation technique, and Russian locale kill switch. The shared tooling suggested a connection to the same malware ecosystem, but operational signatures differed in ways that complicated attribution.
User data is being publicly exfiltrated to GitHub, often going undetected because security tools typically don’t flag data being sent there. This makes the risk significantly more dangerous: anyone searching GitHub can potentially find and access those credentials. Sensitive data is no longer in the hands of a single threat actor; it’s exposed to anyone.
