
Misty’s Chief Information Security Officer 23pds forwards a Bitwarden security team warning. The Bitwarden CLI version 2026.4.0 that had been distributing malicious packages via npm within a 1.5-hour window from 5:57 to 7:30 p.m. Eastern Time on April 22 has been withdrawn. Bitwarden has officially confirmed that the password vault data and production systems were not affected.
Attack Details: Targeted Theft via bw1.js Malicious Payload
The malicious payload runs silently during npm package installation and collects the following types of data:
· GitHub and npm tokens
· SSH keys
· Environment variables
· Shell history
· Cloud credentials
· Encrypted wallet files (including MetaMask, Phantom, and Solana wallets)
The stolen data is exfiltrated to attacker-controlled domains and submitted to GitHub repositories via a persistence mechanism. Many cryptocurrency teams use the Bitwarden CLI in CI/CD automation workflows for key injection and deployment. Any workflow that ran an infiltrated version could leak high-value wallet private keys and exchange API credentials.
Emergency Response Steps for Affected Users
Only users who installed the 2026.4.0 version via npm within the April 22, 5:57 to 7:30 p.m. Eastern Time window need to take the following actions: immediately uninstall the 2026.4.0 version; clear the npm cache; rotate all sensitive credentials such as API tokens and SSH keys; check for abnormal activity in GitHub and CI/CD workflows; upgrade to the fixed 2026.4.1 version (or downgrade to 2026.3.0, or download the officially signed binary from the Bitwarden official website).
Attack Background: npm Trusted Publish Mechanism First Exploited
Security researcher Adnan Khan points out that this attack is a known first case of the npm trusted publish mechanism being used to compromise software packages. This attack is related to TeamPCP’s supply-chain attack activities. Since March 2026, TeamPCP has launched similar attacks against security tools Trivy, the code security platform Checkmarx, and the AI tool LiteLLM, aiming to embed developer tools within CI/CD build processes.
Frequently Asked Questions
How can I check whether I installed the affected 2026.4.0 version?
Run npm list -g @bitwarden/cli to see the installed version. If it shows 2026.4.0 and the installation time falls between 5:57 and 7:30 p.m. Eastern Time on April 22, you need to take immediate action. Even if you’re unsure of the installation time, it’s recommended to proactively rotate all related credentials.
Was Bitwarden vault data leaked?
No. Bitwarden has officially confirmed that user password vault data and production systems were not compromised. This attack only affected the CLI build process. The attack targets developer credentials and encrypted wallet files, not the Bitwarden platform’s user password database.
What is the broader context of TeamPCP supply-chain attack activities?
Since March 2026, TeamPCP has launched a series of supply-chain attacks targeting developer tools. Affected targets include Trivy, Checkmarx, and LiteLLM. The attack on the Bitwarden CLI is part of the same series of activities, aiming to steal high-value credentials in automated pipelines by embedding developer tools within CI/CD build processes.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
Zondacrypto Exchange Faces Allegations of Misappropriating $350 Million, CEO Publicly Denies
One of Poland’s largest cryptocurrency exchanges, Zondacrypto, announced on April 16 via social media that its CEO, Przemysław Kral, said the exchange could not access a wallet holding 4,503 bitcoins, worth more than $350 million in current value. Kral published the address of the wallet in question to rebut allegations of misappropriation, but this disclosure immediately triggered a large-scale withdrawal.
MarketWhisper1h ago
JPMorgan Chase: KelpDAO bug wipes out $20 billion in DeFi TVL, institutional appeal damaged
A J.P. Morgan research team led by analyst Nikolaos Panigirtzoglou released a report on April 23 stating that persistent security vulnerabilities and stagnant total locked value (TVL) are weakening DeFi’s appeal to institutional investors. The report emphasized that the KelpDAO vulnerability wiped out roughly $20 billion worth of DeFi TVL within days, exposing structural risks.
MarketWhisper1h ago
Slow Mist Alert: North Korean hacker group recruits and tricks Web3 developers, stealing 12 million in 3 months
SlowMist, a security organization, has issued an emergency alert. North Korea’s Lazarus organization’s subsidiary, HexagonalRodent, is launching attacks against Web3 developers, using social engineering tactics such as high-paying remote positions to lure developers into executing skill assessment code that includes malicious software backdoors, ultimately stealing crypto assets. According to an Expel investigation report, in the first three months of 2026, the loss amount reached $12 million.
MarketWhisper1h ago
CoW DAO proposes compensation for victims of the cow.fi domain hijacking, with up to 100% reimbursement of losses
CoW DAO on April 23 published a compensation proposal (CIP) in the governance forum, proposing the establishment of a discretionary grant program to provide eligible victims of the April 14 cow.fi domain hijacking incident with up to 100% loss reimbursement. The incident is estimated to have caused user losses of about US$1.2 million in USDC. CoW DAO emphasized that the compensation is of a voluntary, special-discretionary nature and does not represent an admission of any legal liability.
MarketWhisper2h ago
CryptoQuant: KelpDAO Exploit Triggers the Most Severe Crisis Since 2024, Aave TVL Plunges 33%
According to CryptoQuant’s assessment on April 23, the KelpDAO exploit attack that occurred last week created potential bad debt risk for Aave of $124 million to $230 million within 72 hours, with TVL crashing 33%. USDT and USDC borrowing rates jumped from 3.4% to 14%, and ETH borrowing rates rose to the highest level since January 2024 at 8%.
MarketWhisper2h ago
North Korean APT Group HexagonalRodent Steals $12M in Crypto from Web3 Developers Using AI-Powered Attacks
Gate News message, April 24 — A North Korean state-sponsored APT group dubbed HexagonalRodent has stolen over $12 million in cryptocurrency and NFTs from Web3 developers in the first quarter of 2026, according to cybersecurity firm Expel. The group compromised 2,726 developer devices and gained acce
GateNews2h ago