Notepad++ Update Hijacked in Supply Chain Attack

Article Highlights
Off On

The implicit trust users place in automatic software updates was profoundly shaken when developers of the popular text editor Notepad++ disclosed a critical security breach affecting their update infrastructure on February 2, 2026. This incident highlights a growing and dangerous trend where threat actors target the software supply chain to distribute malware to unsuspecting users. According to the official statement from the developers, the widely used application became the vector for a sophisticated attack campaign that went undetected for months. The initial compromise occurred at the hosting provider level between June and September 2025, granting attackers persistent access to internal services through December of that year. This extended period of unauthorized access allowed the threat actors to meticulously plan and execute their operation, turning a routine software update into a targeted malware delivery mechanism. The breach serves as a stark reminder that even trusted and reputable software can be subverted, forcing both developers and end-users to reconsider their security posture and the inherent risks of automated software distribution channels.

1. Anatomy of a Sophisticated Campaign

The attack demonstrated an exceptional level of operational sophistication and careful planning, distinguishing it from more common, widespread malware campaigns. Threat actors maintained a dynamic and evolving attack infrastructure over a four-month period, from July to October 2025, continuously rotating their command and control server addresses, downloader components, and final malicious payloads. This constant modification made the campaign a moving target, significantly complicating efforts for security teams to detect, analyze, and neutralize the threat. Rather than a broad-spectrum attack, the operation was highly targeted, affecting only about a dozen machines belonging to specific individuals and organizations. The victims were geographically dispersed, with confirmed targets located in Vietnam, El Salvador, and Australia. The list of compromised entities also included organizations in the Philippines and a specific IT service provider based in Vietnam, suggesting a focused espionage or reconnaissance objective rather than a motive of widespread disruption or financial gain. This surgical precision indicates that the attackers had clear goals and likely conducted prior intelligence gathering to identify their targets.

During their investigation, security analysts from Securelist successfully identified and dissected three distinct infection chains, each employing unique technical characteristics and advanced evasion techniques. This multi-pronged approach further illustrates the attackers’ resourcefulness and determination to remain undetected. The threat actors leveraged a diverse toolkit that included well-known offensive security frameworks such as Metasploit for initial downloaders and Cobalt Strike Beacon for post-exploitation activities, allowing them to maintain control over compromised systems. In the later stages of the campaign, the attackers deployed a custom backdoor known as Chrysalis, indicating a higher level of capability and a desire to use proprietary tools that are less likely to be flagged by standard security solutions. Despite the complexity and variety of malicious payloads observed throughout the campaign, Kaspersky’s security products were reportedly successful in blocking the identified attacks as they occurred, preventing the final objectives of the threat actors from being fully realized on protected systems.

2. Technical Breakdown and Evasion Tactics

The first observable infection chain was initiated in late July 2025, when attackers began distributing a malicious NSIS installer through the compromised Notepad++ update infrastructure. When the legitimate Notepad++.exe updater process executed the malicious update.exe file, the payload immediately began conducting system reconnaissance. It sent a comprehensive profile of the victim’s machine to attacker-controlled servers, using the temp.sh file hosting service as an exfiltration channel. This initial data gathering was thorough, with the malware executing a series of shell commands to collect the current username, a list of running processes, detailed system information, and active network connections. The results of these commands were then carefully packaged and uploaded using crafted curl commands, providing the attackers with critical intelligence to determine if the compromised machine was a target of interest and how to proceed with the next phase of the attack. This automated reconnaissance phase was crucial for the attackers to filter out non-essential victims and focus their efforts exclusively on their intended targets without raising unnecessary alarms.

In a clever move to bypass modern security defenses, the attackers deliberately avoided the commonly used DLL sideloading technique, which is heavily monitored by many endpoint detection and response systems. Instead, they exploited an older, more obscure vulnerability in ProShow software that dates back to the early 2010s. This unconventional approach helped them evade detection systems that are primarily tuned to identify newer and more prevalent attack vectors. The exploit payload was ingeniously crafted with two distinct shellcodes. The first shellcode served merely as padding, designed to confuse and thwart automated analysis and sandboxing environments. The second, operative shellcode was responsible for decrypting a Metasploit downloader. This downloader then retrieved the final Cobalt Strike Beacon shellcode from remote servers, establishing a persistent and powerful backdoor on the victim’s system. This multi-stage, layered exploitation process showcased the attackers’ deep technical expertise and their commitment to remaining hidden while achieving their objectives within the targeted networks.

3. Detection and Mitigation Strategies

Security teams were able to identify this threat by monitoring for specific artifacts and behaviors associated with the malicious NSIS installer. A primary indicator of compromise that was identified was the creation of the %localappdata%Tempns.tmp directory, a signature behavior of the NSIS installer deployment. In addition, network traffic analysis proved crucial; organizations were advised to inspect for any unusual DNS resolutions to the temp.sh domain, which the attackers used for data exfiltration. System logs also provided vital clues, as security teams could search for the execution of reconnaissance commands such as whoami, tasklist, systeminfo, and netstat originating from unexpected processes. By correlating these indicators, defenders could piece together the attack chain and identify compromised systems. Further layers of defense were established through the implementation of behavioral detection rules designed to flag unauthorized modifications to registry autorun keys, a common persistence mechanism. Monitoring for suspicious connections to Living-Off-the-Land C2 services also provided an effective method for detecting the ongoing communication between the malware and its controllers, ultimately helping to contain the impact of this sophisticated supply chain compromise.

Explore more

Is Passive Leadership Damaging Your Team?

In the modern workplace’s relentless drive to empower employees and dismantle the structures of micromanagement, a far quieter and more insidious management style has taken root, often disguised as trust and autonomy. This approach, where leaders step back to let their teams flourish, can inadvertently create a vacuum of guidance that leaves high-performers feeling adrift and organizational problems festering beneath

Digital Payments Reshape South Africa’s Economy

The once-predictable rhythm of cash transactions across South Africa is now being decisively replaced by the rapid, staccato pulse of digital payments, fundamentally rewriting the nation’s economic narrative and creating a landscape of unprecedented opportunity and complexity. This systemic transformation is moving far beyond simple card swipes and online checkouts. It represents the maturation of a sophisticated, mobile-first financial environment

AI-Driven Payments Protocol – Review

The insurance industry is navigating a critical juncture where the immense potential of artificial intelligence collides directly with non-negotiable demands for data security and regulatory compliance. The One Inc Model Context Protocol (MCP) emerges at this intersection, representing a significant advancement in insurance technology. This review explores the protocol’s evolution, its key features, performance metrics, and the impact it has

Marketo’s New AI Delivers on Its B2B Promise

The promise of artificial intelligence in marketing has often felt like an echo in a vast chamber, generating endless noise but little clear direction. For B2B marketers, the challenge is not simply adopting AI but harnessing its immense power to create controlled, measurable business outcomes instead of overwhelming buyers with a deluge of irrelevant content. Adobe’s reinvention of Marketo Engage

Trend Analysis: Credibility in B2B Marketing

In their relentless pursuit of quantifiable engagement, many B2B marketing organizations have perfected the mechanics of being widely seen but are fundamentally failing at the more complex science of being truly believed. This article dissects the critical flaw in modern B2B strategies: the obsessive pursuit of reach over the foundational necessity of credibility. A closer examination reveals why high visibility