A malicious version of Bitwarden CLI (v2026.4.0) was published to the npm registry after attackers compromised a GitHub Action in Bitwarden's CI/CD pipeline. The trojanized package was live for roughly 1.5 hours before being removed. It contained a custom loader that harvested a wide range of developer and cloud credentials — including GitHub tokens, npm tokens, AWS/GCP keys, SSH keys, and AI agent API keys — and actively weaponized found GitHub tokens to escalate access and extract secrets from CI/CD workflows. The attack is attributed to a group called TeamPCP, linked to recent supply chain compromises of Checkmarx KICS and the Trivy scanner. Affected users should rotate all developer and cloud credentials immediately and follow a detailed remediation checklist.
1 Comment
Sort: