Loading...
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Bitwarden CLI Compromised in TeamPCP Supply Chain Attack Targeting Developer Secrets

Dark cyberpunk-style developer workspace with multiple monitors displaying code in a dimly lit environment, featuring Bitwarden logo

A malicious version of the Bitwarden command-line interface (CLI) was distributed via the npm registry as part of a broader supply chain attack campaign linked to TeamPCP, exposing sensitive developer credentials and secrets used in automated environments. While Bitwarden confirmed the incident and stated that its core infrastructure and user vault data were not impacted, the compromise introduces significant risk for organizations that installed the affected package.

Compromised CI pipeline used to distribute malicious release

Security researchers identified that version @bitwarden/cli@2026.4.0 was tampered with prior to publication, with malicious code embedded inside the distributed package. The attack is believed to have originated from a compromised GitHub Actions workflow within Bitwarden’s CI/CD pipeline, allowing attackers to publish a backdoored version through a trusted delivery channel.

This method aligns with a broader pattern observed across recent supply chain incidents, where attackers target automated build and release systems rather than directly compromising developer accounts.

Preinstall hook enabled silent credential harvesting

The malicious payload was executed via a preinstall hook, allowing it to run automatically during installation without requiring user interaction. Once triggered, the malware collected sensitive data from local systems and CI/CD environments, including GitHub tokens, npm credentials, SSH keys, environment variables, and shell history.

Stolen data was encrypted and exfiltrated to attacker-controlled infrastructure, including a domain designed to impersonate a legitimate security provider. As a fallback mechanism, the malware could also upload harvested data to GitHub repositories, significantly increasing the risk of exposure beyond a single threat actor.

Token theft created pathway to CI/CD pipeline takeover

Beyond initial credential harvesting, the attack introduced a more severe risk by targeting GitHub tokens used in automated workflows. Researchers warn that stolen tokens could be weaponized to inject malicious GitHub Actions workflows into repositories, enabling attackers to persist within development pipelines and continuously extract secrets.

In this scenario, a single compromised developer environment could become an entry point into multiple systems, granting attackers access to any infrastructure connected to the affected pipelines.

Part of a broader TeamPCP supply chain campaign

The Bitwarden incident is consistent with a wider campaign attributed to TeamPCP, which has targeted developer tools, open-source packages, and cloud-based workflows throughout 2026. BreachNews previously reported on a TeamPCP-linked supply chain attack impacting Mercor, where attackers exposed sensitive AI training data tied to major technology companies.

Additional activity linked to the group has impacted government and enterprise environments. Earlier reporting connected TeamPCP to a breach affecting European Commission systems, highlighting the scale and reach of the campaign.

A broader overview of the group’s operations and tactics is available in the BreachNews TeamPCP threat actor profile.

Trusted publishing mechanisms increasingly targeted

Researchers note that the attack may represent one of the first known compromises involving npm’s trusted publishing mechanism, which is designed to eliminate reliance on long-lived credentials in package deployment. By compromising CI/CD workflows, attackers can bypass traditional safeguards and distribute malicious code through legitimate channels.

This shift reflects a growing trend in supply chain attacks, where trust in automated systems becomes the primary attack surface. A prior supply chain attack involving the Axios JavaScript library demonstrated how widely used dependencies can be leveraged to deliver malware at scale.

Limited exposure window but high impact potential

Bitwarden confirmed that the malicious package was available for a limited window of approximately 90 minutes on April 22, 2026, before being identified and removed. The company stated that only users who installed the affected version during that timeframe are considered at risk.

Bitwarden emphasized that no end-user vault data, production systems, or core infrastructure were compromised, and that the issue was isolated to the npm distribution path for the CLI tool.

Links to evolving “Shai-Hulud” supply chain activity

Analysis of the malicious package revealed indicators linking it to a broader campaign sometimes referred to as “Shai-Hulud,” a multi-stage operation targeting developer ecosystems. While attribution remains under investigation, shared tooling and infrastructure suggest overlap with previously observed TeamPCP activity.

Researchers caution that variations in operational behavior may indicate either multiple actors using the same tooling or an evolution in the campaign’s tactics.

Developers urged to rotate credentials and audit systems

Security experts recommend that any organization or developer who installed the affected version immediately rotate all credentials that may have been exposed. This includes API keys, SSH keys, cloud tokens, and any secrets stored within CI/CD pipelines.

Organizations are also advised to review recent repository activity, audit workflow configurations, and monitor for unauthorized access across cloud and development environments.

Supply chain attacks continue expanding across developer ecosystems

The incident highlights the growing focus on developer tooling as a high-value attack surface. By targeting widely used utilities embedded in automated workflows, attackers can gain access to sensitive environments without directly breaching production systems.

As supply chain attacks evolve, organizations may need to reassess trust assumptions around third-party dependencies and implement stricter controls around build pipelines, package verification, and credential management.

Picture of m00s3c

m00s3c

Moose (@m00s3c) is the author of BreachNews, focusing on data breach intelligence, dark web monitoring, and threat analysis. His work involves analyzing breach claims, reviewing leaked datasets, and tracking threat actor activity to provide clear, factual reporting.

Related Posts

Newsletter signup

Get the latest data breach and security news.

Please wait...

Thank you for signing up!

Search & Monitoring Tools

Free Data Breach Search Tool

Check your email against 12 billion+ leaked records — then set up alerts so you're the first to know if you appear in a new breach.

Instant breach lookup
Real-time monitoring & alerts
12 billion+ leaked records
Check now Set up monitoring

Powered by BreachNews