A malicious version of the Bitwarden command-line interface (CLI) was distributed via the npm registry as part of a broader supply chain attack campaign linked to TeamPCP, exposing sensitive developer credentials and secrets used in automated environments. While Bitwarden confirmed the incident and stated that its core infrastructure and user vault data were not impacted, the compromise introduces significant risk for organizations that installed the affected package.
Compromised CI pipeline used to distribute malicious release
Security researchers identified that version @bitwarden/cli@2026.4.0 was tampered with prior to publication, with malicious code embedded inside the distributed package. The attack is believed to have originated from a compromised GitHub Actions workflow within Bitwarden’s CI/CD pipeline, allowing attackers to publish a backdoored version through a trusted delivery channel.
This method aligns with a broader pattern observed across recent supply chain incidents, where attackers target automated build and release systems rather than directly compromising developer accounts.
Preinstall hook enabled silent credential harvesting
The malicious payload was executed via a preinstall hook, allowing it to run automatically during installation without requiring user interaction. Once triggered, the malware collected sensitive data from local systems and CI/CD environments, including GitHub tokens, npm credentials, SSH keys, environment variables, and shell history.
Stolen data was encrypted and exfiltrated to attacker-controlled infrastructure, including a domain designed to impersonate a legitimate security provider. As a fallback mechanism, the malware could also upload harvested data to GitHub repositories, significantly increasing the risk of exposure beyond a single threat actor.
Token theft created pathway to CI/CD pipeline takeover
Beyond initial credential harvesting, the attack introduced a more severe risk by targeting GitHub tokens used in automated workflows. Researchers warn that stolen tokens could be weaponized to inject malicious GitHub Actions workflows into repositories, enabling attackers to persist within development pipelines and continuously extract secrets.
In this scenario, a single compromised developer environment could become an entry point into multiple systems, granting attackers access to any infrastructure connected to the affected pipelines.
Part of a broader TeamPCP supply chain campaign
The Bitwarden incident is consistent with a wider campaign attributed to TeamPCP, which has targeted developer tools, open-source packages, and cloud-based workflows throughout 2026. BreachNews previously reported on a TeamPCP-linked supply chain attack impacting Mercor, where attackers exposed sensitive AI training data tied to major technology companies.
Additional activity linked to the group has impacted government and enterprise environments. Earlier reporting connected TeamPCP to a breach affecting European Commission systems, highlighting the scale and reach of the campaign.
A broader overview of the group’s operations and tactics is available in the BreachNews TeamPCP threat actor profile.
Trusted publishing mechanisms increasingly targeted
Researchers note that the attack may represent one of the first known compromises involving npm’s trusted publishing mechanism, which is designed to eliminate reliance on long-lived credentials in package deployment. By compromising CI/CD workflows, attackers can bypass traditional safeguards and distribute malicious code through legitimate channels.
This shift reflects a growing trend in supply chain attacks, where trust in automated systems becomes the primary attack surface. A prior supply chain attack involving the Axios JavaScript library demonstrated how widely used dependencies can be leveraged to deliver malware at scale.
Limited exposure window but high impact potential
Bitwarden confirmed that the malicious package was available for a limited window of approximately 90 minutes on April 22, 2026, before being identified and removed. The company stated that only users who installed the affected version during that timeframe are considered at risk.
Bitwarden emphasized that no end-user vault data, production systems, or core infrastructure were compromised, and that the issue was isolated to the npm distribution path for the CLI tool.
Links to evolving “Shai-Hulud” supply chain activity
Analysis of the malicious package revealed indicators linking it to a broader campaign sometimes referred to as “Shai-Hulud,” a multi-stage operation targeting developer ecosystems. While attribution remains under investigation, shared tooling and infrastructure suggest overlap with previously observed TeamPCP activity.
Researchers caution that variations in operational behavior may indicate either multiple actors using the same tooling or an evolution in the campaign’s tactics.
Developers urged to rotate credentials and audit systems
Security experts recommend that any organization or developer who installed the affected version immediately rotate all credentials that may have been exposed. This includes API keys, SSH keys, cloud tokens, and any secrets stored within CI/CD pipelines.
Organizations are also advised to review recent repository activity, audit workflow configurations, and monitor for unauthorized access across cloud and development environments.
Supply chain attacks continue expanding across developer ecosystems
The incident highlights the growing focus on developer tooling as a high-value attack surface. By targeting widely used utilities embedded in automated workflows, attackers can gain access to sensitive environments without directly breaching production systems.
As supply chain attacks evolve, organizations may need to reassess trust assumptions around third-party dependencies and implement stricter controls around build pipelines, package verification, and credential management.












