Security Concern Lurking in the Shadows of Your Favorite Text Editor: What You Need to Know About Notepad++.
If you're a regular user of Notepad++, a widely used text editor for Windows, it's essential to take notice. The update infrastructure for this application has been compromised by suspected China-state hackers who have delivered backdoored versions to select targets. Yes, you read that right - your favorite text editor may be hosting malicious code without your knowledge.
The vulnerability was discovered last June when the attackers intercepted and redirected update traffic destined for Notepad++. From there, they selectively redirected certain targeted users to malicious update servers where they received infected updates. Fortunately, Notepad++ regained control of its infrastructure in December, but not before the attack had a six-month window to wreak havoc.
The attackers used their access to install a never-before-seen payload called Chrysalis, which is essentially a custom feature-rich backdoor. According to security firm Rapid7, this tool has wide-ranging capabilities and appears to be sophisticated and permanent - not your run-of-the-mill throwaway utility.
But how did the hackers manage to get their hands on Notepad++'s update infrastructure? Independent researcher Kevin Beaumont discovered that the update process for older versions of Notepad++ was vulnerable due to insufficient update verification controls. This allowed the attackers to sit inside the ISP chain and redirect users to malicious servers, which they could only do by intercepting and changing traffic.
Beaumont's working theory, published two months prior to Monday's advisory by Notepad++, is now vindicated. It appears that the attackers used a bespoke updater known as GUP or WinGUP to inject malware into updates. The gup.exe executable would report its version in use to https://notepad-plus-plus.org/update/getDownloadUrl.php and retrieve an update URL from a file named gup.xml, which was then downloaded to the %TEMP% directory of the device.
Beaumont's advice is straightforward: run official Notepad++ updates manually from notepad-plus-plus.org. However, due to recent developments, developers now urge users to ensure they're running 8.9.1 or higher.
But that's not all - Beaumont also warns that search engines are flooded with malicious Notepad++ extensions that can infect users unknowingly. Users who want to investigate whether their devices have been targeted should refer to the indicators of compromise listed in a previously linked Rapid7 post.
The situation is a sobering reminder that even seemingly innocuous applications like text editors can harbor vulnerabilities that could be exploited by malicious actors. It's essential for users to stay vigilant and keep up-to-date with security patches - after all, Notepad++'s weaknesses are a stark reminder of the importance of robust monitoring and proper software updates.
If you're a regular user of Notepad++, a widely used text editor for Windows, it's essential to take notice. The update infrastructure for this application has been compromised by suspected China-state hackers who have delivered backdoored versions to select targets. Yes, you read that right - your favorite text editor may be hosting malicious code without your knowledge.
The vulnerability was discovered last June when the attackers intercepted and redirected update traffic destined for Notepad++. From there, they selectively redirected certain targeted users to malicious update servers where they received infected updates. Fortunately, Notepad++ regained control of its infrastructure in December, but not before the attack had a six-month window to wreak havoc.
The attackers used their access to install a never-before-seen payload called Chrysalis, which is essentially a custom feature-rich backdoor. According to security firm Rapid7, this tool has wide-ranging capabilities and appears to be sophisticated and permanent - not your run-of-the-mill throwaway utility.
But how did the hackers manage to get their hands on Notepad++'s update infrastructure? Independent researcher Kevin Beaumont discovered that the update process for older versions of Notepad++ was vulnerable due to insufficient update verification controls. This allowed the attackers to sit inside the ISP chain and redirect users to malicious servers, which they could only do by intercepting and changing traffic.
Beaumont's working theory, published two months prior to Monday's advisory by Notepad++, is now vindicated. It appears that the attackers used a bespoke updater known as GUP or WinGUP to inject malware into updates. The gup.exe executable would report its version in use to https://notepad-plus-plus.org/update/getDownloadUrl.php and retrieve an update URL from a file named gup.xml, which was then downloaded to the %TEMP% directory of the device.
Beaumont's advice is straightforward: run official Notepad++ updates manually from notepad-plus-plus.org. However, due to recent developments, developers now urge users to ensure they're running 8.9.1 or higher.
But that's not all - Beaumont also warns that search engines are flooded with malicious Notepad++ extensions that can infect users unknowingly. Users who want to investigate whether their devices have been targeted should refer to the indicators of compromise listed in a previously linked Rapid7 post.
The situation is a sobering reminder that even seemingly innocuous applications like text editors can harbor vulnerabilities that could be exploited by malicious actors. It's essential for users to stay vigilant and keep up-to-date with security patches - after all, Notepad++'s weaknesses are a stark reminder of the importance of robust monitoring and proper software updates.