<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Bitwarden CLI Hijacked in Supply Chain Attack — Crypto Wallets and Developer Credentials at Risk]]></title><description><![CDATA[<p dir="auto"><img src="/forum/assets/uploads/files/1777023976642-1802a6b4-74bb-495f-913a-ac55101ece97-image.png" alt="1802a6b4-74bb-495f-913a-ac55101ece97-image.png" class=" img-fluid img-markdown" /><br />
Attackers have compromised Bitwarden's CLI version 2026.4.0 through a hijacked GitHub Action, injecting a malicious npm package designed to steal sensitive data during installation. Security firm Socket discovered the breach on April 23, linking it to the ongoing TeamPCP supply chain campaign. The rogue package has since been pulled, but any developer or team that installed the compromised version during that window may already be affected.</p>
<p dir="auto">The malicious payload, embedded in a file called bw1.js, targeted a wide range of high-value credentials including GitHub and npm tokens, SSH keys, environment variables, shell history, and cloud credentials. TeamPCP's broader campaign is separately confirmed to go after crypto wallet data, including files associated with MetaMask, Phantom, and Solana wallets. Stolen data was exfiltrated to attacker-controlled domains and committed back to GitHub repositories as a persistence mechanism.</p>
<p dir="auto">The breach is particularly serious for crypto teams, as many use the Bitwarden CLI in automated CI/CD pipelines for secrets injection and deployments. Any workflows that ran version 2026.4.0 may have exposed wallet keys and exchange API credentials. Security researcher Adnan Khan noted this is the first known compromise of a package using npm's trusted publishing mechanism — a system specifically designed to eliminate long-lived tokens.</p>
]]></description><link>https://undeads.com/forum/topic/18967/bitwarden-cli-hijacked-in-supply-chain-attack-crypto-wallets-and-developer-credentials-at-risk</link><generator>RSS for Node</generator><lastBuildDate>Tue, 05 May 2026 03:54:14 GMT</lastBuildDate><atom:link href="https://undeads.com/forum/topic/18967.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 24 Apr 2026 09:46:18 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Bitwarden CLI Hijacked in Supply Chain Attack — Crypto Wallets and Developer Credentials at Risk on Fri, 24 Apr 2026 11:41:17 GMT]]></title><description><![CDATA[<p dir="auto">"rotate every exposed secret without delay" printed this out and taped it above my monitor. it has been there since the last supply chain incident. it will stay there.</p>
]]></description><link>https://undeads.com/forum/post/51971</link><guid isPermaLink="true">https://undeads.com/forum/post/51971</guid><dc:creator><![CDATA[madtrader]]></dc:creator><pubDate>Fri, 24 Apr 2026 11:41:17 GMT</pubDate></item></channel></rss>