Brunswick, ME • (207) 245-1010 • contact@johnzblack.com
This wasn’t a typo-squat. It was the real deal. For 93 minutes, the official Bitwarden CLI account on npm was serving malware instead of security tools.
The attack was smooth. It used a preinstall hook to download a JavaScript runtime called Bun and then executed a silent payload. The goal was to scrape everything: SSH keys, AWS tokens, and even your private AI tool configuration files.
When attackers stop hitting random utility packages and start going after the security tools we trust, the entire trust hierarchy of the developer machine breaks down. Between this and the new Ghost 2.0 campaign on PyPI, it is clear that supply chain hits are becoming more strategic and professional.
If you ran an install during that 90-minute window, it is time to rotate every single secret in your environment.