Executive Summary
The malicious @bitwarden/cli package weaponized trust in a recognizable developer tool name to steal secrets from developer endpoints and CI/CD environments.
Technical post covering the malicious @bitwarden/cli npm package, command-line execution indicators, related infrastructure, and response guidance for developer and CI/CD environments.
The structured fields below are intended for technical responders, not just general readers.
The malicious @bitwarden/cli package weaponized trust in a recognizable developer tool name to steal secrets from developer endpoints and CI/CD environments.
This incident matters beyond one package version because it demonstrates a repeatable attacker pattern: typosquat or impersonate a trusted developer dependency, then execute credential theft with follow-on propagation behavior.
Developer workstations, CI/CD runners, local secret stores, cloud credentials, and package ecosystem trust are directly affected.
Mitigated, but the package version and execution commands remain valuable retrospective indicators.
Search lockfiles and install logs for the malicious version, hunt for the listed commands in process telemetry, and rotate credentials if the package resolved in any sensitive environment.
Agent-authored technical narrative, preserving headings, lists, and code blocks.
This incident weaponized trust in a recognizable developer security tool name. Because Bitwarden CLI is plausible on both laptops and CI/CD systems, the attacker only needed one malicious package resolution event to land in environments that already held privileged secrets.
npm
@bitwarden/cli@2026.4.0
Verified.
@bitwarden/cli package version and frames it as a supply-chain compromise targeting secret-rich environments.Why this matters: The social engineering is built into the package identity itself. Analysts should assume that the trust signal was the package name, not a secondary lure.
Verified with high confidence.
node bw_setup.js, /bun bw1.js, and audit.checkmarx.cx align this package with the campaign's repeated loader and infrastructure patterns.Why this matters: This is not just a one-package incident. It is useful as a pivot point into related malicious package activity and reused attacker infrastructure.
Verified.
Why this matters: Response has to prioritize secret rotation and account review, not only package removal.
@bitwarden/cli version under a trusted-looking developer-tool identity.node bw_setup.js and /bun bw1.js.audit.checkmarx.cx became relevant for exfiltration or follow-on activity.The core execution surface is dependency resolution in a sensitive environment. A malicious CLI package is dangerous because it may be installed or unpacked exactly where vault tokens, cloud credentials, and workflow secrets are already present.
node bw_setup.js
/bun bw1.js
audit.checkmarx.cx
94.154.172.43
The Bun-related process indicator is important because it lines up with the broader campaign tendency to use JavaScript-centric second-stage execution.
The package is especially high risk on:
rg -n "@bitwarden/cli@2026.4.0" package-lock.json pnpm-lock.yaml yarn.lock
rg -n "node bw_setup.js|/bun bw1.js|audit.checkmarx.cx|94.154.172.43" ~/Library/Logs /var/log "$WORKSPACE"
Analyst focus:
Affected package coordinates and indicators are grouped once for hunting, detections, and review.
@bitwarden/cli@2026.4.0 @bitwarden/cli@2026.4.0 @bitwarden/cli@2026.4.0 @bitwarden/cli@2026.4.0 /bun bw1.js
node bw_setup.js audit.checkmarx.cx 94.154.172.43 Detection logic is rendered as code so technical users can lift it directly into their own tooling.
rg -n "@bitwarden/cli@2026.4.0" package-lock.json pnpm-lock.yaml yarn.lock rg -n "node bw_setup.js|/bun bw1.js|audit.checkmarx.cx|94.154.172.43" ~/Library/Logs /var/log "$WORKSPACE" A concise event chronology helps responders anchor first-seen and disclosure timing.
Researchers documented the malicious @bitwarden/cli package version and its credential-theft behavior.
Cross-campaign overlap linked the Bitwarden package wave to broader TeamPCP infrastructure.
Primary references are kept visible so analysts can trace the underlying reporting quickly.
Primary incident reporting for the malicious Bitwarden CLI package impersonation.
Microsoft Security Blog - TeamPCP expansion Mar 25, 2026, 12:00 AMCross-campaign linkage connecting Bitwarden infrastructure to broader TeamPCP activity.