China's State-Backed Hackers Hijacked Notepad++ Update Infrastructure, Delivering a Backdoored Version to Select Targets
In a major cyber espionage operation, suspected China-state hackers hijacked the update infrastructure for Notepad++, a widely used text editor for Windows. The attack lasted for six months, allowing the attackers to deliver a backdoored version of the app to select targets.
According to independent researcher Kevin Beaumont, the attackers compromised an "infrastructure-level" vulnerability in Notepad++'s update process, which allowed them to intercept and redirect update traffic destined for notepad-plus-plus.org. The malicious actors then selectively redirected certain targeted users to malicious update servers where they received backdoored updates.
The attackers installed a custom, feature-rich backdoor, dubbed Chrysalis, which has been described as "sophisticated and permanent." The payload was never-before-seen and indicates that the attackers had significant resources at their disposal.
Experts warn that the vulnerabilities in Notepad++'s update process were easily exploitable and could have been fixed with sufficient resources. The attack highlights the risks associated with relying on third-party services for software updates, particularly when those services are vulnerable to cyber espionage.
To mitigate this risk, users are advised to run the official version 8.8.8 or higher installed manually from notepad-plus-plus.org. Larger organizations should consider blocking notepad-plus-plus.org or blocking the gup.exe process from having internet access.
In a major cyber espionage operation, suspected China-state hackers hijacked the update infrastructure for Notepad++, a widely used text editor for Windows. The attack lasted for six months, allowing the attackers to deliver a backdoored version of the app to select targets.
According to independent researcher Kevin Beaumont, the attackers compromised an "infrastructure-level" vulnerability in Notepad++'s update process, which allowed them to intercept and redirect update traffic destined for notepad-plus-plus.org. The malicious actors then selectively redirected certain targeted users to malicious update servers where they received backdoored updates.
The attackers installed a custom, feature-rich backdoor, dubbed Chrysalis, which has been described as "sophisticated and permanent." The payload was never-before-seen and indicates that the attackers had significant resources at their disposal.
Experts warn that the vulnerabilities in Notepad++'s update process were easily exploitable and could have been fixed with sufficient resources. The attack highlights the risks associated with relying on third-party services for software updates, particularly when those services are vulnerable to cyber espionage.
To mitigate this risk, users are advised to run the official version 8.8.8 or higher installed manually from notepad-plus-plus.org. Larger organizations should consider blocking notepad-plus-plus.org or blocking the gup.exe process from having internet access.