By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Password Safe Bitwarden: Command Line Client Trojanized | heise online
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Software > Password Safe Bitwarden: Command Line Client Trojanized | heise online
Software

Password Safe Bitwarden: Command Line Client Trojanized | heise online

News Room
Last updated: 2026/04/23 at 1:54 PM
News Room Published 23 April 2026
Share
Password Safe Bitwarden: Command Line Client Trojanized | heise online
SHARE

Between 11:57 p.m. on April 22nd and 1:30 a.m. on April 23rd German time (5:57 p.m. to 7:30 p.m. ET), the npm package @bitwarden/cli version 2026.4.0 was delivered with malicious code. This compromised version stole user credentials. However, Bitwarden emphasizes that end-user data stored in the actual safe (vault data) is not affected.

Read more after the ad

As Bitwarden announced in its community forum, the security team has identified and contained the manipulated package. The distribution was therefore carried out exclusively via NPM; anyone who did not obtain the package via NPM during the time in question would not be affected. The compromised version has now been marked as deprecated and the abused access has been revoked. The incident is part of a larger attack on the Checkmarx supply chain.

Sophisticated credential stealer with fallback mechanisms

Security researchers from JFrog and Socket.dev analyzed the malware in detail. That manipulated package.json contained one preinstall-Script that automatically creates a loader file called when installing bw_setup.js executed. This downloaded the Bun runtime (version 1.3.13) from GitHub and started an obfuscated JavaScript payload (bw1.js).

The malicious code targeted a wide range of sensitive data: GitHub and npm tokens, SSH keys, shell histories, and AWS, Google Cloud, and Azure credentials. Furthermore, GitHub Actions Secrets, Git Credentials, .envfiles and even configuration files are read by AI tools like Claude and MCP and sent to the attackers.

The exfiltration was primarily encrypted to the address audit.checkmarx.cx (IP: 94.154.172.43). As a fallback, the malware used a sophisticated mechanism: stolen GitHub tokens were validated to create data exfiltration repositories under the victim’s account. Double-Base64-encoded PATs were hidden in commit messages with the marker “LongLiveTheResistanceAgainstMachines”.

Immediate countermeasures required

Read more after the ad

Anyone who installed version 2026.4.0 within the specified time window should act immediately. Bitwarden recommends uninstalling with npm uninstall -g @bitwarden/cli and clearing the npm cache. On affected systems, administrators should look for the artifacts bw_setup.js, bw1.js and a downloaded Bun runtime.

It is particularly important to rotate all credentials that were stored on the compromised system: GitHub Personal Access Tokens, npm tokens, AWS Access Keys, Azure and GCP secrets, and SSH keys. GitHub Actions workflows should also be checked for unauthorized executions. The domain audit.checkmarx.cx and the IP 94.154.172.43 should be blocked in firewalls.

All repositories are currently delivering the regular version 2026.3.0 again. According to the manufacturer, this and all other versions of the Bitwarden CLI except 2026.4.0 are not affected. Production systems and vault data were never compromised.


(yeah)



Unfortunately, this link is no longer valid.

Links to gifted items will be invalid if they are older than 7 days or have been accessed too often.


You need a heise+ package to read this article. Try it now for a week without obligation – without obligation!

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article The head of a pirate IPTV network receives a record sanction in Spain The head of a pirate IPTV network receives a record sanction in Spain
Next Article We thought that AI was going to collapse the electrical grid. The solution is to “unplug” it 18 days a year We thought that AI was going to collapse the electrical grid. The solution is to “unplug” it 18 days a year
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

A shortcut to Mars may have been found
A shortcut to Mars may have been found
Computing
Public charging network increasingly dangerous | heise online
Public charging network increasingly dangerous | heise online
Software
Freelancer or permanent employee? | Computer Week
Freelancer or permanent employee? | Computer Week
News
Fatal overdose after ChatGPT council: Parents of deceased teenager sue OpenAI
Fatal overdose after ChatGPT council: Parents of deceased teenager sue OpenAI
Gadget

You Might also Like

Public charging network increasingly dangerous | heise online
Software

Public charging network increasingly dangerous | heise online

6 Min Read
SAP invests: n8n becomes one of the most valuable German AI startups
Software

SAP invests: n8n becomes one of the most valuable German AI startups

3 Min Read
Digital sovereignty: Federal Office for the Protection of the Constitution buys the European Palantir alternative
Software

Digital sovereignty: Federal Office for the Protection of the Constitution buys the European Palantir alternative

5 Min Read
Perplexity Personal Computer for Mac now available for testing
Software

Perplexity Personal Computer for Mac now available for testing

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?