**Notepad++ Users, Re-Run the Update: Hackers Were Behind the Scenes for Months**
If you use Notepad++, a popular text editor for Windows, it's time to think twice about those automatic updates. According to independent researchers and security firms, suspected Chinese-state hackers compromised the update infrastructure of the app for six months, delivering backdoored versions to select targets.
The attackers, who were linked to the Chinese government, used their control over the update process to install a sophisticated payload dubbed "Chrysalis." This custom feature-rich backdoor was designed to be permanent and offer wide-ranging capabilities. The hackers took advantage of weak update verification controls in older versions of Notepad++ and exploited them to redirect select users to malicious servers.
Notepad++ developers are now urging all users to ensure they're running version 8.8.8 or higher, installed manually from the official website. Larger organizations should consider blocking notepad-plus-plus.org or the gup.exe process from having Internet access. Users can investigate whether their devices have been targeted by referring to the indicators of compromise security published by Rapid7.
The recent exploit highlights the importance of regular updates and careful monitoring of software components. Notepad++, which has long attracted a loyal user base, is now facing scrutiny over its vulnerabilities. With many open-source projects like it relying on donations and user support, it's essential for users to be aware of potential security risks and take proactive measures to protect themselves.
The incident also raises concerns about the impact of Internet Service Providers (ISPs) on software updates. According to Kevin Beaumont, an independent researcher, the hackers were able to tamper with update traffic if they sat in the ISP chain, making it possible for them to redirect downloads to malicious servers.
If you use Notepad++, a popular text editor for Windows, it's time to think twice about those automatic updates. According to independent researchers and security firms, suspected Chinese-state hackers compromised the update infrastructure of the app for six months, delivering backdoored versions to select targets.
The attackers, who were linked to the Chinese government, used their control over the update process to install a sophisticated payload dubbed "Chrysalis." This custom feature-rich backdoor was designed to be permanent and offer wide-ranging capabilities. The hackers took advantage of weak update verification controls in older versions of Notepad++ and exploited them to redirect select users to malicious servers.
Notepad++ developers are now urging all users to ensure they're running version 8.8.8 or higher, installed manually from the official website. Larger organizations should consider blocking notepad-plus-plus.org or the gup.exe process from having Internet access. Users can investigate whether their devices have been targeted by referring to the indicators of compromise security published by Rapid7.
The recent exploit highlights the importance of regular updates and careful monitoring of software components. Notepad++, which has long attracted a loyal user base, is now facing scrutiny over its vulnerabilities. With many open-source projects like it relying on donations and user support, it's essential for users to be aware of potential security risks and take proactive measures to protect themselves.
The incident also raises concerns about the impact of Internet Service Providers (ISPs) on software updates. According to Kevin Beaumont, an independent researcher, the hackers were able to tamper with update traffic if they sat in the ISP chain, making it possible for them to redirect downloads to malicious servers.