China's State-Backed Hackers Hacked Notepad++, Leaving Thousands Vulnerable to Attacks
In a shocking discovery, suspected China-state hackers have compromised the update infrastructure of popular free source code editor and note-taking app Notepad++. For six months, these hackers hijacked the update process, delivering a backdoored version of the app to select targets.
The attack began last June with an "infrastructure-level compromise" that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org. The hackers then selectively redirected certain targeted users to malicious update servers where they received backdoored updates. Notepad++ didn't regain control of its infrastructure until December.
Security firm Rapid 7 described the attack as a "custom, feature-rich backdoor" dubbed Chrysalis. According to experts, this is a sophisticated and permanent tool with a wide array of capabilities that indicate it was designed for long-term use, not a simple throwaway utility.
Experts believe that Notepad++'s update infrastructure was vulnerable due to insufficient update verification controls in older versions of the app. The hackers exploited these weaknesses to deliver malware-laced updates, including the Chrysalis backdoor.
According to independent researcher Kevin Beaumont, three organizations told him that devices inside their networks that had Notepad++ installed experienced "security incidents" that resulted in hands-on keyboard threat actors. These attackers were able to take direct control using a web-based interface.
Beaumont warned that search engines are "rammed full" of advertisements pushing trojanized versions of Notepad++, making it likely for users to unwittingly install malicious extensions and put their devices at risk.
Notepad++ developers have since urged all users to ensure they're running version 8.9.1 or higher installed manually from notepad-plus-plus.org. Experts recommend blocking notepad-plus-plus.org or the gup.exe process from having internet access for larger organizations, but caution that this may be overkill and impractical.
Users who want to investigate whether their devices have been targeted can refer to the indicators of compromise security post by Rapid 7.
In a shocking discovery, suspected China-state hackers have compromised the update infrastructure of popular free source code editor and note-taking app Notepad++. For six months, these hackers hijacked the update process, delivering a backdoored version of the app to select targets.
The attack began last June with an "infrastructure-level compromise" that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org. The hackers then selectively redirected certain targeted users to malicious update servers where they received backdoored updates. Notepad++ didn't regain control of its infrastructure until December.
Security firm Rapid 7 described the attack as a "custom, feature-rich backdoor" dubbed Chrysalis. According to experts, this is a sophisticated and permanent tool with a wide array of capabilities that indicate it was designed for long-term use, not a simple throwaway utility.
Experts believe that Notepad++'s update infrastructure was vulnerable due to insufficient update verification controls in older versions of the app. The hackers exploited these weaknesses to deliver malware-laced updates, including the Chrysalis backdoor.
According to independent researcher Kevin Beaumont, three organizations told him that devices inside their networks that had Notepad++ installed experienced "security incidents" that resulted in hands-on keyboard threat actors. These attackers were able to take direct control using a web-based interface.
Beaumont warned that search engines are "rammed full" of advertisements pushing trojanized versions of Notepad++, making it likely for users to unwittingly install malicious extensions and put their devices at risk.
Notepad++ developers have since urged all users to ensure they're running version 8.9.1 or higher installed manually from notepad-plus-plus.org. Experts recommend blocking notepad-plus-plus.org or the gup.exe process from having internet access for larger organizations, but caution that this may be overkill and impractical.
Users who want to investigate whether their devices have been targeted can refer to the indicators of compromise security post by Rapid 7.