Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign

The Hacker News
Actively Exploited

Overview

The Bitwarden CLI tool has been compromised as part of an ongoing supply chain attack linked to Checkmarx, as reported by security researchers from JFrog and Socket. The malicious code was found in the package version @bitwarden/cli@2026.4.0, specifically within a file named 'bw1.js.' This incident raises concerns for users of the Bitwarden CLI, as the compromised package could potentially allow attackers to execute harmful actions via the tool. Organizations and individuals using this version should take immediate action to protect their data. The incident underscores the risks associated with supply chain vulnerabilities, which can affect a wide range of software users and developers.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: @bitwarden/cli@2026.4.0
  • Action Required: Users should update to a secure version of Bitwarden CLI immediately to prevent potential exploitation.
  • Timeline: Newly disclosed

Original Article Summary

Bitwarden CLI has been compromised as part of the newly discovered and ongoing Checkmarx supply chain campaign, according to new findings from JFrog and Socket. "The affected package version appears to be @bitwarden/cli@2026.4.0, and the malicious code was published in 'bw1.js,' a file included in the package contents," the application security company said. "The attack appears to have leveraged

Impact

@bitwarden/cli@2026.4.0

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Newly disclosed

Remediation

Users should update to a secure version of Bitwarden CLI immediately to prevent potential exploitation.

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Malware.

Related Coverage

A dozen allied agencies say China is building covert hacker networks out of everyday routers

CyberScoop

A coalition of twelve allied agencies has issued a warning regarding a shift in tactics by Chinese hackers, who are reportedly using common routers to build covert hacking networks. These everyday devices, often overlooked in terms of security, can be exploited to gain unauthorized access to sensitive information. Organizations are advised to enhance their security measures by regularly updating router firmware, changing default passwords, and monitoring network traffic for unusual activity. This development is particularly concerning given the widespread use of consumer-grade routers, which could be leveraged to compromise a vast number of networks. The implications are significant, as this tactic could enable attackers to infiltrate both personal and corporate systems without detection.

Apr 23, 2026

Over $12M stolen in North Korean crypto heist against web developers

SCM feed for Latest

A North Korean hacking group known as HexagonalRodent has reportedly stolen up to $12 million in cryptocurrency from Web3 developers. This operation, linked to the state-backed group Famous Chollima, took place between January and March of this year. The attackers targeted individuals and organizations involved in Web3 technology, which includes decentralized applications and blockchain development. The stolen funds could be used to finance North Korea's activities, raising concerns about the implications for both the cryptocurrency industry and international security. As the threat from state-sponsored cybercrime continues to grow, developers in the tech space need to enhance their security measures to protect against such sophisticated attacks.

Apr 23, 2026

Actively exploited SharePoint spoofing bug continues to threaten over 1,300 instances

SCM feed for Latest

A critical vulnerability in Microsoft SharePoint, identified as CVE-2026-32201, is currently being exploited by attackers. Over 1,300 SharePoint servers exposed to the internet remain at risk, with fewer than 200 instances patched since the last Patch Tuesday. This zero-day spoofing flaw allows unauthorized access, which could lead to significant data breaches or further intrusions. Organizations using SharePoint should prioritize applying available updates to mitigate the risk and secure their systems against ongoing attacks. The situation underscores the urgency for users to remain vigilant and proactive in patch management.

Apr 23, 2026

Cosmetics giant Rituals discloses data breach affecting customers

BleepingComputer

Rituals, a Dutch cosmetics company, has reported a data breach that has compromised the personal information of customers in its 'My Rituals' membership database. While the exact number of affected individuals remains undisclosed, the breach raises concerns about the security of customer data in an era where personal information is increasingly targeted by cybercriminals. This incident serves as a reminder for companies to prioritize data protection measures and for customers to be vigilant about their personal information. Rituals has yet to provide detailed guidance on how affected customers can protect themselves or what steps the company is taking to address the breach. Such breaches can lead to identity theft and other security risks, making it crucial for both companies and consumers to take proactive measures against data vulnerabilities.

Apr 23, 2026

Apple Fixes iOS Notification Bug Exposing Deleted Messages

Infosecurity Magazine

Apple has addressed a significant flaw in iOS that allowed deleted notifications to linger and expose message content. This vulnerability could potentially let others view sensitive information even after users thought they had deleted it. Affected users include anyone running iOS versions prior to the fix, which was rolled out in a recent update. The issue raises concerns about privacy, as it could lead to unintended sharing of personal messages. Apple has encouraged users to update their devices to ensure their information remains secure.

Apr 23, 2026

Chinese Cybersecurity Firm’s AI Hacking Claims Draw Comparisons to Claude Mythos

SecurityWeek

360 Digital Security Group, a Chinese cybersecurity firm, claims to have identified 1,000 vulnerabilities using artificial intelligence. This includes findings from the Tianfu Cup hacking contest, which is known for showcasing talent in cybersecurity. The firm's assertion raises eyebrows as it draws comparisons to previous claims made by Claude Mythos, a controversial figure in the cybersecurity space. The significance of these findings lies in the potential implications for software and systems security, as vulnerabilities can be exploited by malicious actors. Companies and developers should take note of these claims and assess their products for the identified vulnerabilities to bolster their defenses.

Apr 23, 2026