GitGuardian's analysis of the @bitwarden/cli npm package compromise reveals a sophisticated supply chain attack. The malware uses GitHub as a C2 channel, staging stolen PATs in public commit messages tagged with 'LongLiveTheResistanceAgainstMachines' and discovering exfiltration domains via 'beautifulcastle' commits. A new Cloudflare exfiltration domain was identified: safely-irc-weblogs-few[.]trycloudflare[.]com. One confirmed victim was compromised via the Checkmarx KICS Docker image, which was pulled automatically by Dependabot during a CI dependency update — giving the malware access to repository secrets. GitGuardian links this to the broader TeamPCP campaign and recommends applying cooldown periods to automated dependency updates.

2m read timeFrom blog.gitguardian.com
Post cover image
Table of contents
beautifulcastleLongLiveTheResistanceAgainstMachinesInitial access vector: KICS via Dependabot

Sort: