Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Security News
Notepad++, Notepad++ Security, Notepad++ Supply Chain
Notepad++, Notepad++ Security, Notepad++ Supply Chain

Notepad++ Supply Chain Attack – 2026

Report Date: February 3, 2026Classification: Public
Threat Type: Supply Chain CompromiseAttribution: Lotus Blossom (Moderate Confidence)

Executive Summary

Notepad++ confirmed an infrastructure-level compromise affecting its update mechanism from June through December 2025. Attackers hijacked the hosting provider’s server to selectively redirect update requests from targeted users to malicious servers. This wasn’t a vulnerability in Notepad++ code itself. The attackers compromised the infrastructure surrounding the software distribution process.

According to Kaspersky’s GReAT team (published February 3, 2026), the attack involved three distinct infection chains that rotated approximately monthly. The operation targeted telecommunications and financial services organizations primarily in East Asia, with victims also identified in Vietnam, El Salvador, Australia, and the Philippines. Multiple independent security researchers assess the threat actor as likely Chinese state-sponsored, specifically the Lotus Blossom APT (also known as Billbug, Spring Dragon, or Thrip).

Attack Timeline

DateEvent
June 2025Initial compromise of shared hosting server begins
Late July 2025Chain #1 deployed: NSIS installer with ProShow DLL sideloading, Cobalt Strike Beacon via Metasploit downloader
September 2025Chain #2 deployed: Lua interpreter-based execution with system information exfiltration via temp.sh
Sept 2, 2025Direct server access severed after kernel/firmware update
October 2025Chain #3 deployed: BluetoothService DLL sideloading with Chrysalis backdoor
Dec 2, 2025Credential access to internal services terminated; Kevin Beaumont publicly reports initial findings
Feb 2, 2026Official Notepad++ disclosure published with investigation details

Affected Versions and Technical Details

The WinGUp updater (Windows Generic Update Program) contained a fundamental weakness: versions prior to v8.8.9 did not verify the certificate and signature of downloaded installers. Although v8.8.7 introduced GlobalSign certificate signing and v8.8.8 restricted downloads to GitHub, the updater itself still didn’t enforce verification of what it downloaded.

In-Scope Versions

Version RangeStatusAction Required
< v8.8.7HIGH RISKImmediate update + audit
v8.8.7 – v8.8.8MODERATE RISKUpdate + audit if updated Jun-Dec 2025
v8.8.9+PATCHEDUpdate verification enforced

Threat Risk Scenarios

The following scenarios illustrate potential organizational impacts based on the observed attack patterns. These are risk scenarios derived from confirmed attack behaviors, not hypothetical speculation.

Scenario 1: Developer Workstation Compromise

Risk LevelHIGH
Attack VectorTrojanized Notepad++ update delivers Cobalt Strike or Chrysalis backdoor via NSIS installer
ImpactPersistent access to developer machine with source code, credentials, API keys, and CI/CD pipeline access. Attackers collect system info via temp.sh upload before deploying persistent implants.
DetectionDNS queries to temp.sh, execution of whoami/tasklist/systeminfo/netstat from GUP.exe child process, NSIS temp directory creation, DLL sideloading from %appdata%\ProShow or %appdata%\Bluetooth paths

Scenario 2: Initial Access to Financial Services Network

Risk LevelHIGH
Attack VectorSelective targeting based on IP/organization. Attackers specifically searched for notepad-plus-plus.org traffic and redirected only targeted users.
ImpactFinancial services organizations in East Asia were confirmed targets. Potential for transaction system access, customer data exposure, regulatory violations. Six-month dwell time before detection.
SourceKevin Beaumont (security researcher) identified telecoms and financial services in East Asia as confirmed targets

Scenario 3: Government Organization Espionage

Risk LevelHIGH
Confirmed TargetA government organization in the Philippines was identified by Kaspersky as a confirmed victim
ImpactState-sponsored espionage objectives. Chrysalis backdoor deployment provides persistent access for intelligence collection. Pattern consistent with Lotus Blossom APT’s historical targeting of Southeast Asian governments.
Attribution NoteLotus Blossom APT attribution assessed with moderate confidence based on targeting patterns, TTPs, and infrastructure analysis (per SOCRadar, Rapid7)

Scenario 4: IT Service Provider Pivot

Risk LevelMODERATE-HIGH
Confirmed TargetAn IT service provider organization in Vietnam was identified by Kaspersky as a confirmed victim
ImpactCompromised MSP/IT service providers create cascading risk. Attackers potentially gain access to multiple customer environments through a single compromise. Remote management tools and customer credentials at risk.
Supply Chain RiskThis represents a supply chain attack within a supply chain attack. MSP compromise multiplies attacker reach significantly.

Indicators of Compromise

The following IoCs were published by Kaspersky GReAT on February 3, 2026. Additional IoCs from Rapid7’s Chrysalis backdoor analysis are included where noted.

Malicious Update Distribution URLs

  • http://45.76.155[.]202/update/update.exe
  • http://45.32.144[.]255/update/update.exe
  • http://95.179.213[.]0/update/update.exe
  • http://95.179.213[.]0/update/install.exe
  • http://95.179.213[.]0/update/AutoUpdater.exe

C2 Infrastructure Domains

  • cdncheck.it[.]com
  • self-dns.it[.]com
  • safe-dns.it[.]com
  • api.wiresguard[.]com (Rapid7)
  • api.skycloudcenter[.]com (Rapid7)

File Hashes (SHA1) – Malicious Installers

  • 8e6e505438c21f3d281e1cc257abdbf7223b7f5a
  • 90e677d7ff5844407b9c073e3b7e896e078e11cd
  • 573549869e84544e3ef253bdba79851dcde4963a
  • 13179c8f19fbf3d8473c49983a199e6cb4f318f0
  • 4c9aac447bf732acc97992290aa7a187b967ee2c
  • 821c0cafb2aab0f063ef7e313f64313fc81d46cd
  • d7ffd7b588880cf61b603346a3557e7cce648c93

Malicious File Paths

  • %appdata%\ProShow\load
  • %appdata%\Adobe\Scripts\alien.ini
  • %appdata%\Bluetooth\BluetoothService
  • %localappdata%\Temp\ns.tmp (NSIS indicator)

Detection Recommendations

The following detection methods are derived from Kaspersky’s analysis:

  1. Monitor DNS queries for temp.sh domain (unusual in corporate environments and used for system info exfiltration)
  2. Detect HTTP requests with temp.sh URLs embedded in User-Agent header
  3. Alert on reconnaissance commands (whoami, tasklist, systeminfo, netstat -ano) spawned by GUP.exe
  4. Monitor NSIS installer deployments via %localappdata%\Temp\ns.tmp directory creation
  5. Block or monitor notepad-plus-plus.org and gup.exe internet access for enterprise-managed deployments
  6. Hunt for DLL sideloading from %appdata%\ProShow, %appdata%\Adobe\Scripts, and %appdata%\Bluetooth paths

Sources

Author

Tech Jacks Solutions

Leave a comment

Your email address will not be published. Required fields are marked *