Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

0
Medium
Malware
Published: Wed Feb 18 2026 (02/18/2026, 07:40:00 UTC)
Source: The Hacker News

Description

Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver malware to targets of interest. The version 8.9.2 update incorporates what maintainer Don Ho calls a "double lock" design that aims to make the update process "robust and effectively unexploitable." This includes verification

AI-Powered Analysis

AILast updated: 02/18/2026, 10:12:58 UTC

Technical Analysis

In mid-2025, Notepad++'s update mechanism was compromised due to a breach at its hosting provider, allowing a China-linked advanced persistent threat (APT) group known as Lotus Panda to hijack update traffic selectively. This supply chain attack enabled the delivery of a previously undocumented backdoor malware named Chrysalis to targeted victims. The attackers redirected update requests from specific users to malicious servers serving poisoned updates, effectively implanting malware under the guise of legitimate software updates. Notepad++ responded by releasing version 8.9.2, which introduced a "double lock" design to secure the update process. This design includes verification of the signed installer downloaded from GitHub (introduced in version 8.8.9) and newly added verification of the signed XML metadata returned by the official update server. Additionally, the auto-updater component WinGUp was hardened by removing the vulnerable libcurl.dll to prevent DLL side-loading, disabling insecure cURL SSL options (CURLSSLOPT_ALLOW_BEAST and CURLSSLOPT_NO_REVOKE), and restricting plugin management execution to programs signed with the same certificate as WinGUp. Notepad++ also patched a high-severity vulnerability (CVE-2026-25926, CVSS 7.3) involving an unsafe search path (CWE-426) that could allow arbitrary code execution if an attacker controlled the working directory when launching Windows Explorer without an absolute path. The supply chain incident itself is tracked as CVE-2025-15556 with a CVSS score of 7.7. The attack highlights the risks of software supply chain compromises and the importance of cryptographic verification of update components. Notepad++ users are strongly advised to update to version 8.9.2 and ensure downloads come from official domains to avoid infection by the Chrysalis backdoor or other malware.

Potential Impact

European organizations using Notepad++—a widely adopted text editor among developers, IT professionals, and technical users—face significant risks from this supply chain attack. The targeted delivery of the Chrysalis backdoor enables attackers to gain persistent access, potentially leading to espionage, intellectual property theft, or disruption of operations. Given Notepad++'s popularity in software development and IT environments, compromised systems could serve as beachheads for lateral movement within networks. The arbitrary code execution vulnerability further increases risk by allowing local privilege escalation or execution of malicious payloads. The attack's selective targeting suggests high-value entities, such as government agencies, critical infrastructure operators, and technology firms, could be specifically targeted. This could result in loss of sensitive data, operational disruption, and reputational damage. The stealthy nature of supply chain attacks complicates detection and remediation, increasing potential dwell time of attackers in affected networks. Overall, the threat poses a medium to high risk to European organizations reliant on Notepad++ for development or administrative tasks.

Mitigation Recommendations

European organizations should immediately update all Notepad++ installations to version 8.9.2 or later, ensuring downloads are obtained exclusively from the official Notepad++ domain or verified GitHub releases. Implement cryptographic verification of update packages and metadata to confirm authenticity before installation. Audit existing systems for indicators of compromise related to the Chrysalis backdoor, including unusual network connections or persistence mechanisms. Restrict execution privileges for auto-updater components and plugins to signed binaries only, as per the updated WinGUp design. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behaviors associated with supply chain malware. Conduct network segmentation to limit lateral movement if compromise occurs. Regularly review and harden software supply chain security policies, including vetting of hosting providers and update infrastructure. Educate users about risks of installing software from unofficial sources. Finally, monitor threat intelligence feeds for updates on Lotus Panda activities and related indicators.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/notepad-fixes-hijacked-update-mechanism.html","fetched":true,"fetchedAt":"2026-02-18T10:12:39.249Z","wordCount":908}

Threat ID: 6995909980d747be205dea22

Added to database: 2/18/2026, 10:12:41 AM

Last enriched: 2/18/2026, 10:12:58 AM

Last updated: 2/21/2026, 12:12:56 AM

Views: 227

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats