← Back to Tech & Science

TeamPCP Compromises Bitwarden CLI in Supply Chain Attack

Tech & ScienceAI-Generated & Algorithmically Scored·

AI-generated from multiple sources. Verify before acting on this reporting.

LONDON (AP) — A sophisticated supply chain attack targeting the Bitwarden command-line interface has exposed developer credentials and secrets globally, security researchers confirmed Wednesday.

The threat actor known as TeamPCP infiltrated the Bitwarden CLI package version 2026.4.0 by injecting malicious code into a GitHub Action within the Checkmarx supply chain campaign. The compromise, detected on April 23, 2026, at 14:44 UTC, allowed the attackers to exfiltrate authentication tokens and sensitive data from systems that installed the tainted software.

The attack leveraged the trust inherent in software supply chains, where developers rely on third-party tools to build and secure applications. By compromising a widely used package distribution channel, TeamPCP gained access to a broad network of victims without needing to breach individual company firewalls directly. The malicious payload was designed to silently capture and transmit credentials to a remote server controlled by the threat group.

Bitwarden, a password management service, has since issued an advisory urging users to update their CLI tools immediately. The company stated that the compromised version was removed from the npm registry to prevent further infections. Security experts warn that organizations relying on the affected version may have already suffered data breaches, with the full extent of the compromise still being assessed.

The incident highlights the growing vulnerability of software supply chains to targeted attacks. As companies increasingly depend on open-source libraries and automated build processes, the risk of a single compromised component affecting thousands of downstream users has risen sharply. TeamPCP has previously been linked to similar operations targeting financial institutions and technology firms, suggesting a pattern of high-value espionage.

Cybersecurity firms are now investigating whether other packages within the Checkmarx ecosystem were similarly compromised. The group is also working to identify the specific mechanisms TeamPCP used to bypass security controls and inject the malicious code. Questions remain about how long the attackers had access to the build pipeline before the intrusion was detected.

Developers are advised to audit their systems for signs of compromise, including unauthorized network connections or unexpected changes to configuration files. The incident serves as a stark reminder of the need for robust supply chain security measures, including code signing, dependency scanning, and continuous monitoring of third-party components.

As the investigation continues, the cybersecurity community is calling for greater transparency and collaboration to prevent future attacks of this nature. The incident underscores the critical importance of securing the software development lifecycle against increasingly sophisticated threat actors.