The attackers exploited a GitHub Actions workflow within Bitwarden’s CI/CD pipeline to inject malicious code into its npm package, marking another escalation in the ongoing Checkmarx-related supply chain campaign.
Cybersecurity researchers at Socket have uncovered that the compromised package, identified as @bitwarden/cli version 2026.4.0, contains a hidden malicious payload embedded in a file named bw1.js.
Importantly, the incident is limited to the npm distribution of the CLI tool. Bitwarden’s browser extensions, including its Chrome extension, and other official releases remain unaffected.
This attack highlights the growing risks associated with software supply chains, particularly when automated pipelines like GitHub Actions are leveraged to distribute tampered packages at scale.
The injected malware functions as an aggressive credential harvester.
Once executed, it scans system memory and environment variables to extract sensitive data, including:
The malware communicates with a command-and-control (C2) endpoint linked to previous Checkmarx attacks, specifically infrastructure at 94.154.172.43 and audit.checkmarx.cx.
Interestingly, the payload includes a Russian locale-based kill switch. If the system locale or environment variables begin with “ru,” the malware terminates without executing, suggesting deliberate targeting restrictions.
Instead of traditional data exfiltration methods, the attackers used compromised GitHub accounts to create public repositories containing stolen data.
These repositories follow a distinct naming convention inspired by the sci-fi franchise Dune, using terms such as “fremen,” “sandworm,” and “mentat.”
Descriptions within these repositories include references like “Shai-Hulud: The Third Coming” and a “Butlerian Jihad” manifesto, indicating ideological or signature-based branding by the attackers.
To maintain persistence, the malware injects itself into shell profile scripts and uses a lock file (/tmp/tmp.987654321.lock) to prevent duplicate execution.
Security teams should watch for the following indicators:
Organizations using the affected package should treat this as a critical credential exposure incident.
Immediate actions include:
For long-term resilience, organizations should enforce least-privilege access, adopt short-lived tokens, and harden GitHub Actions permissions to reduce supply chain attack risks.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post Bitwarden CLI Hit by Supply Chain Attack Through GitHub Actions appeared first on Cyber Security News.
Blizzard has formally apologized to fans, acknowledging its latest World of Warcraft patch "was not…
Clair Obscur: Expedition 33 is celebrating the first anniversary of its release with a free…
The post A Secretive AI Hacking System Has Sparked A Global Scramble appeared first on…
The post Microsoft Offers Its First Buyouts To Shape Workforce Around AI Push appeared first…
The post Tech Leaders Celebrated At 15th Annual Women In Technology Awards appeared first on TV…
The post NBCU’s Universal Production Services to Launch Solar, Off-Grid Trailer Fleet appeared first on…
This website uses cookies.