{"id":96497,"date":"2026-04-25T07:00:00","date_gmt":"2026-04-25T04:00:00","guid":{"rendered":"https:\/\/u1f987.com\/en\/?p=96497"},"modified":"2026-04-25T09:06:40","modified_gmt":"2026-04-25T06:06:40","slug":"bitwarden-cli-hack-arrest-of-illicit-debt-collectors-in-kyiv-and-other-cybersecurity-news","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/bitwarden-cli-hack-arrest-of-illicit-debt-collectors-in-kyiv-and-other-cybersecurity-news\/","title":{"rendered":"Bitwarden CLI hack, arrest of illicit debt collectors in Kyiv, and other cybersecurity news"},"content":{"rendered":"<p>We have compiled the week&#8217;s most important cybersecurity news.<\/p>\n<div class=\"wp-block-text-wrappers-keypoints article_keypoints\">\n<ul class=\"wp-block-list\">\n<li>North Korean hackers stole $12m in crypto in three months using AI tools.<\/li>\n<li>A former ransomware negotiator turned out to be an accomplice.<\/li>\n<li>UK intelligence: 100 governments have access to commercial spyware.<\/li>\n<li>An infostealer was planted in Bitwarden\u2019s developer-facing password manager.<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"wp-block-heading\">North Korean hackers stole $12m in crypto in three months using AI tools<\/h2>\n<p>Over three months, the North Korean hacking group HexagonalRodent stole about $12m in cryptocurrency and infected more than 2,000 <a href=\"https:\/\/u1f987.com\/en\/news\/what-is-web3\">Web3<\/a> developers\u2019 machines to steal credentials and gain access to crypto wallets, <a href=\"https:\/\/expel.com\/blog\/inside-lazarus-how-north-korea-uses-ai-to-industrialize-attacks-on-developers\/\">said<\/a> Expel cybersecurity specialist Marcus Hutchins.<\/p>\n<p>The campaign relied on \u201cvibe coding\u201d \u2014 generating malware and infrastructure via text prompts to AI systems:<\/p>\n<ul class=\"wp-block-list\">\n<li>using Anima\u2019s AI web-design tools, the hackers built sites for non-existent IT firms;<\/li>\n<li>victims were lured with fake job listings and asked to complete a \u201ctest assignment\u201d that contained malware;<\/li>\n<li>all code and correspondence in flawless English were generated with ChatGPT and Cursor.<\/li>\n<\/ul>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/u1f987.com\/wp-content\/uploads\/img-061dc5d03f9c2f6d-2657443949967204.webp\" alt=\"image\" class=\"wp-image-278968\"\/><figcaption class=\"wp-element-caption\">Snippet of the hackers\u2019 code. Source: Expel.\u00a0<\/figcaption><\/figure>\n<p>The expert analysed the hackers\u2019 infrastructure, which they inadvertently left exposed. Their prompts and a database of victims\u2019 wallets leaked online. Hutchins noted the code was filled with English comments and emojis \u2014 a clear sign the software was entirely generated by a <span data-descr=\"large language model\" class=\"old_tooltip\">LLM<\/span>.<\/p>\n<p>Hutchins argues that in 2026 Pyongyang made a qualitative leap by using AI to automate every stage of its cyberattacks, turning low-skilled operators into a scaled cyberthreat.<\/p>\n<p>HexagonalRodent\u2019s work is only part of North Korea\u2019s broader strategy to automate crime, corroborated by reports from other technology firms:<\/p>\n<ul class=\"wp-block-list\">\n<li>Microsoft <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/03\/06\/ai-as-tradecraft-how-threat-actors-operationalize-ai\/\">reported<\/a> that North Korean operators use AI to generate fake documents, research vulnerabilities and conduct social engineering;<\/li>\n<li>Anthropic <a href=\"https:\/\/www-cdn.anthropic.com\/b2a76c6f6992465c09a6f2fce282f6c0cea8c200.pdf\">said<\/a> it blocked attempts by DPRK agents to use the Claude model to refine malware.<\/li>\n<\/ul>\n<p>In comments to <a href=\"https:\/\/www.wired.com\/story\/ai-tools-are-helping-mediocre-north-korean-hackers-steal-millions\/\">WIRED<\/a>, representatives of OpenAI, Cursor and Anima confirmed misuse of their services. They said accounts linked to the hackers had been blocked; the investigation will help prevent similar incidents.<\/p>\n<h2 class=\"wp-block-heading\">A former ransomware negotiator turned out to be an accomplice<\/h2>\n<p>Angelo Martino, formerly a ransomware negotiator at cybersecurity firm DigitalMint, pleaded guilty to aiding cybercriminals, the <a href=\"https:\/\/www.justice.gov\/opa\/pr\/florida-man-working-ransomware-negotiator-pleads-guilty-conspiracy-deploy-ransomware-and\">US Department of Justice<\/a> said.<\/p>\n<p>Martino admitted he played both sides in five separate incidents. While ostensibly working for victims, he passed confidential information to operators of the ALPHV\/BlackCat malware and supplied details such as insurance coverage limits and victims\u2019 negotiation strategies.<\/p>\n<p>Investigators found that Martino maximised the payouts to criminals and took a cut.<\/p>\n<p>The ALPHV\/BlackCat group operated a <a href=\"https:\/\/u1f987.com\/en\/news\/a-subscription-to-crime-how-rented-hacking-software-imperils-web3\">CaaS<\/a> model, in which the gang builds and maintains file-encrypting software while \u201caffiliates\u201d deploy it in attacks and share profits with the developers.<\/p>\n<p>In 2023, law enforcement seized the gang\u2019s dark-web site and released a decryptor that helped more than 500 victims restore systems.<\/p>\n<p>In 2025, other DigitalMint employees \u2014 Kevin Tyler Martin and Ryan Clifford Goldberg \u2014 aided the same criminals. Together with Martino they earned over $1.2m from just one victim.\u00a0<\/p>\n<p>Martino pleaded guilty to extortion and faces up to 20 years in prison. Authorities seized $10m in assets from him.<\/p>\n<h2 class=\"wp-block-heading\">UK intelligence: 100 governments have access to commercial spyware<\/h2>\n<p>According to British intelligence, more than half of the world\u2019s governments have access to software capable of hacking devices to steal confidential information, <a href=\"https:\/\/www.politico.eu\/article\/u-k-intelligence-100-nations-have-spyware-that-can-hack-britain\/\">Politico<\/a> reports.<\/p>\n<p>Media say the barrier to obtaining such surveillance technology has fallen. The number of countries potentially possessing these hacking tools has risen to 100, up from 80 <a href=\"https:\/\/therecord.media\/spyware-purchased-by-eighty-countries-gchq-warns\">known<\/a> in 2023.<\/p>\n<p>Commercial spyware developed by private firms \u2014 such as Pegasus from NSO Group \u2014 often relies on vulnerabilities in phone and computer software. Governments say these tools are used only on devices of suspects in serious crimes, including terrorism.<\/p>\n<p>In recent years, the \u201ccircle of victims\u201d has widened from political critics, opponents and journalists to bankers and wealthy businesspeople, according to UK intelligence.<\/p>\n<p>In the US, <span data-descr=\"US Immigration and Customs Enforcement\" class=\"old_tooltip\">ICE<\/span> is actively using the Israeli-made Graphite tool. Acting agency director Todd Lyons confirmed this to <a href=\"https:\/\/www.npr.org\/2026\/04\/07\/nx-s1-5776799\/ice-spyware-privacy\">NPR<\/a>.<\/p>\n<p>According to him, law enforcement uses the software to fight foreign terrorist organisations and fentanyl traffickers who rely on encrypted messengers. The tool can access messages on a phone without any need to click links (zero-click).<\/p>\n<h2 class=\"wp-block-heading\">An infostealer was planted in Bitwarden\u2019s developer CLI<\/h2>\n<p>On 22 April 2026, the official <span data-descr=\"Node Package Manager \u2014 the JavaScript package manager\" class=\"old_tooltip\">npm<\/span> package of the Bitwarden command-line interface (CLI), version 2026.4.0, was compromised. The repository contained a build with malicious code to steal developers\u2019 credentials.<\/p>\n<p>Several security firms analysed the supply-chain compromise and assessed the incident:<\/p>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/research.jfrog.com\/post\/bitwarden-cli-hijack\/\">JFrog<\/a> experts found the package used a custom loader, bw_setup.js, to stealthily execute a spying script. The malware collected npm and GitHub tokens, SSH keys, and credentials for <span data-descr=\"Amazon Web Services\" class=\"old_tooltip\">AWS<\/span>, Azure and Google Cloud;<\/li>\n<li><a href=\"https:\/\/www.ox.security\/blog\/shai-hulud-bitwarden-cli-supply-chain-attack\/\">OX Security<\/a> discovered that the encrypted stolen data were exfiltrated by automatically creating public repositories on the victim\u2019s GitHub account. The repos were tagged \u201cShai-Hulud: The Third Coming,\u201d and the malware could self-propagate;<\/li>\n<li><a href=\"https:\/\/socket.dev\/blog\/bitwarden-cli-compromised\">Socket<\/a> confirmed the malware targeted <span data-descr=\"Continuous integration (CI) and continuous delivery (CD) are a set of principles and practices that enable developers to deploy software changes more frequently and reliably\" class=\"old_tooltip\">CI\/CD<\/span> infrastructure. It also found technical links to the recent supply-chain compromise at <a href=\"https:\/\/nomadicsoft.io\/ru\/blog\/checkmarx-cyberattack-sensitive-data-risk\">Checkmarx<\/a>.<\/li>\n<\/ul>\n<p>The attack is attributed to the TeamPCP group, previously behind large campaigns against developers of Trivy and <a href=\"https:\/\/u1f987.com\/en\/news\/india-arrests-trafficker-solana-used-as-a-dead-drop-and-other-cybersecurity-developments\">LiteLLM<\/a>. Experts strongly urged developers to rotate all keys and tokens immediately if they interacted with the affected CLI.<\/p>\n<p>Bitwarden removed the tainted version just 90 minutes after the attack began and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/bitwarden-cli-npm-package-compromised-to-steal-developer-credentials\/\">confirmed<\/a> that user vaults and passwords remained safe.<\/p>\n<h2 class=\"wp-block-heading\">Apple fixed a bug that let the FBI read deleted Signal notifications<\/h2>\n<p>Apple <a href=\"https:\/\/support.apple.com\/en-us\/127002\">released<\/a> a patch and a security advisory after the FBI <a href=\"https:\/\/u1f987.com\/en\/news\/kraken-faces-extortion-signal-chats-recovered-and-other-cybersecurity-news\">gained access<\/a> to Signal message notification content via iOS even after the app had been deleted.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">We are very happy that today Apple issued a patch and a security advisory. This comes following <a href=\"https:\/\/twitter.com\/404mediaco?ref_src=twsrc%5Etfw\">@404mediaco<\/a> reporting that the FBI accessed Signal message notification content via iOS despite the app being deleted. <\/p>\n<p>Apple\u2019s advisory confirmed that the bugs that allowed this to\u2026<\/p>\n<p>\u2014 Signal (@signalapp) <a href=\"https:\/\/twitter.com\/signalapp\/status\/2047070518776356996?ref_src=twsrc%5Etfw\">April 22, 2026<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Signal said that once the update is installed, all inadvertently saved notifications will be deleted and new ones will not be stored.<\/p>\n<h2 class=\"wp-block-heading\">Kyiv police detained a gang of debt collectors who extorted cryptocurrency using bot farms<\/h2>\n<p>In Kyiv, law enforcement detained fraudsters who used the Bitcapital and Crypsee platforms to provide crypto loans. Debtors and their relatives were harassed with AI-generated abusive content and a bot farm with 6,000 SIM cards, the Cyber Police of Ukraine <a href=\"https:\/\/cyberpolice.gov.ua\/news\/policzejski-kyyeva-zatrymaly-chleniv-ugrupovannya-shho-organizuvalo-botofermu-dlya-vymagannya-kryptoborgiv-z-ukrayincziv-5387\/\">reported<\/a>.<\/p>\n<p>According to investigators, the group set up a call centre in Dnipro and had operated since 2023 under cover of companies registered in the UK and Cyprus.<\/p>\n<p>Operators phoned debtors and, using fake data and voice-changing software, demanded repayment. Even when clients repaid on time, the criminals invented non-existent debts. They then extorted money through threats and blackmail.<\/p>\n<p>The bot farm was used to generate and disseminate degrading content featuring victims\u2019 data and photos \u2014 as well as those of their relatives and colleagues \u2014 and to place systematic threatening phone calls.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/u1f987.com\/wp-content\/uploads\/img-67e5193417d1818e-2657965777913942.webp\" alt=\"c2e8ac2bf841cc5e737785339685806209a36b290846ad87a477aa440d1b8d79\" class=\"wp-image-278969\"\/><figcaption class=\"wp-element-caption\">Source: Cyber Police of Ukraine.<\/figcaption><\/figure>\n<p>At any one time, a separate group of two to six people could \u201cwork\u201d a victim, tailoring approaches to individual vulnerabilities. On success, each took a cut of the funds extorted.<\/p>\n<p>Police carried out 44 searches in Dnipropetrovsk region and Kyiv. More than 80 mobile phones, computer equipment, cash, documents, seals and bot farms were seized.<\/p>\n<p>Preliminary damages exceed 5m hryvnia (about $113,000 at the time of writing). The suspects face up to 12 years in prison.<\/p>\n<p>Also on ForkLog:<\/p>\n<ul class=\"wp-block-list\">\n<li>Tether <a href=\"https:\/\/u1f987.com\/en\/news\/tether-freezes-344-million-in-usdt-at-us-request\">froze<\/a> $344m in USDT at the request of the US.<\/li>\n<li>In the UK, <a href=\"https:\/\/u1f987.com\/en\/news\/uk-cracks-down-on-illegal-p2p-cryptocurrency-trading\">raids were conducted<\/a> to crack down on illicit P2P crypto trading.<\/li>\n<li>Cybersecurity experts <a href=\"https:\/\/u1f987.com\/en\/news\/cybersecurity-experts-warn-of-new-wave-of-north-korean-hacker-attacks\">warned<\/a> of a new wave of DPRK attacks.<\/li>\n<li>Bloomberg reported <a href=\"https:\/\/u1f987.com\/en\/news\/unauthorized-access-to-anthropics-mythos-ai-model-reported-by-bloomberg\">unauthorised access<\/a> to the Mythos AI model.<\/li>\n<li>Hackers <a href=\"https:\/\/u1f987.com\/en\/news\/hackers-breach-volo-extract-3-5-million-from-wbtc-and-usdc-pools\">attacked<\/a> Volo and drained $3.5m from WBTC and USDC pools.<\/li>\n<li>Reporters <a href=\"https:\/\/u1f987.com\/en\/news\/new-bitcoin-extortion-scheme-for-safe-passage-through-the-strait-of-hormuz-uncovered\">learned<\/a> of a new scheme to extort bitcoin for passage through the Strait of Hormuz.<\/li>\n<li>Arbitrum <a href=\"https:\/\/u1f987.com\/en\/news\/arbitrum-freezes-30766-eth-amid-probe-into-kelp-hack\">froze<\/a> 30,000 ETH as part of the Kelp hack investigation.<\/li>\n<li>Eth.limo <a href=\"https:\/\/u1f987.com\/en\/news\/eth-limo-regains-domain-control-after-easydns-breach\">regained<\/a> control of its domain after the easyDNS breach.<\/li>\n<li>The Kelp protocol <a href=\"https:\/\/u1f987.com\/en\/news\/kelp-protocol-loses-293-million-following-cross-chain-bridge-attack\">lost<\/a> $293m after a cross-chain bridge attack.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\">What to read this weekend?<\/h2>\n<p>For a long time, the use of cyberweapons for espionage was seen as the domain of a narrow circle of intelligence services. But a US investigation into Operation Zero exposed the scale of trading in zero-day vulnerabilities.<\/p>\n<p>On states\u2019 shadow markets and the price of hacks \u2014 in ForkLog\u2019s new feature.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have compiled the week&#8217;s most important cybersecurity news.<\/p>\n","protected":false},"author":1,"featured_media":96498,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"The week's key cybersecurity stories: AI-fuelled DPRK heists, Bitwarden CLI breach, spyware spread.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1238,1233],"class_list":["post-96497","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cybersecurity-digest","tag-industry-digests"],"aioseo_notices":[],"amp_enabled":true,"views":"37","promo_type":"1","layout_type":"1","short_excerpt":"The week's key cybersecurity stories: AI-fuelled DPRK heists, Bitwarden CLI breach, spyware spread.","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/96497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=96497"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/96497\/revisions"}],"predecessor-version":[{"id":96499,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/96497\/revisions\/96499"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/96498"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=96497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=96497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=96497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}