A malicious version of the Bitwarden CLI package published on the npm registry has been identified as part of a supply chain compromise targeting developers. The tampered package was designed to harvest sensitive credentials during installation and execution. Since Bitwarden CLI is widely used for secure credential management in development workflows, the incident poses significant risks to software supply chains and enterprise environments relying on automated tooling. The attack involves a compromised npm package impersonating or modifying the legitimate Bitwarden CLI tool. When developers install or update the package, the malicious code executes and captures sensitive information such as API keys, access tokens, and vault credentials. The stolen data is then exfiltrated to attacker-controlled infrastructure. Because npm packages are often integrated into CI/CD pipelines, this type of compromise can lead to widespread credential exposure across multiple systems. This incident highlights the growing threat of software supply chain attacks, where trusted repositories are abused to distribute malicious code. Developers relying on automated dependency installation may unknowingly introduce compromised packages into their environments. The attack underscores the importance of verifying package integrity and maintaining strict control over third-party dependencies in development ecosystems.
Hackers are exploiting fake CAPTCHA pages to trick users into sending large volumes of international SMS messages, turning routine “prove you’re human” checks into a profitab...
A critical vulnerability has been identified in the Breeze Cache plugin for WordPress, actively exploited by attackers to upload arbitrary files without authentication. Tracked as ...
UNC6692 is a threat cluster conducting targeted social engineering campaigns by impersonating IT helpdesk staff through Microsoft Teams. Instead of exploiting software vulnerabilit...