
The Notepad++ Update Compromise: What Happened, Why It Was Targeted, and What Defenders Should Learn
Feb 02, 2026
Executive Summary
In mid to late 2025, a security incident involving Notepad++ raised concerns across the security community. While headlines suggested a “compromised application,” the reality was more nuanced and more instructive.
The Notepad++ source code was not backdoored. Instead, attackers interfered with parts of the update distribution path, selectively delivering malicious updates to specific, high value targets. This incident closely follows the playbook of modern supply chain attacks conducted by advanced threat actors (APTs).
This post breaks down what happened, why the attack was selective, what the real risk was, and most importantly what defenders and threat hunters should do differently going forward.
What Actually Happened
- Attackers gained access to infrastructure involved in the Notepad++ update mechanism
- They did not alter the public source code repository
- Legitimate update requests were conditionally redirected
- Only certain systems received a malicious payload masquerading as a legitimate update
This was not a mass malware campaign. Most users who updated during the affected period received clean binaries and were never at risk.
Timeline of the Incident
Early to Mid 2025
- Attackers gained access to infrastructure associated with Notepad++ update delivery
- No public indicators of compromise were observed
- Normal update behavior continued for most users
Mid 2025
- Conditional redirection logic was introduced
- Update requests from selected environments were served malicious payloads
- Targeting focused on specific IP ranges and organizations
Late 2025
- Security researchers and third parties identified anomalies in update traffic
- Investigation confirmed selective supply chain manipulation
- Infrastructure access by attackers was removed
Post Disclosure
- Notepad++ released hardened update mechanisms
- Signature verification and integrity checks were strengthened
- Users were advised to reinstall from official sources
Why This Was a Targeted Attack (Not a Broad One)
1. Stealth Was the Primary Objective
Mass infections trigger:
- Antivirus detections
- Automated sandbox analysis
- Rapid public disclosure
Selective delivery allows attackers to remain undetected for months.
2. Conditional Payload Delivery
The attackers could decide who received the malicious update based on:
- IP address ranges
- Geographic location
- Organization ownership such as government, research, or enterprise
- Network or system characteristics
If a system did not meet targeting criteria, it received the legitimate update.
3. High Trust, Low Suspicion Software
Notepad++ is:
- Widely installed
- Developer focused
- Rarely monitored closely by EDR policies
This makes it an excellent initial access vector in environments where developer tooling is implicitly trusted.
4. This Matches Known APT Supply Chain Patterns
This incident strongly resembles prior selective supply chain compromises such as:
- CCleaner (2017)
- ASUS Live Update
- Early stages of SolarWinds
In all cases, attackers:
- Targeted specific organizations
- Avoided mass deployment
- Prioritized long term access over fast spread
Who Was Actually at Risk?
You were potentially at risk only if all of the following applied:
- You used the built in auto update feature
- You updated during the compromised window
- Your system matched attacker targeting criteria
Home users and casual environments were very unlikely to be affected.
Vendor Response and Mitigation
The Notepad++ project responded by:
- Strengthening update verification using signature and integrity checks
- Migrating infrastructure
- Advising users to reinstall from trusted sources
Installing a current version from the official site fully mitigates the issue.
Defensive Lessons Learned
1. “Trusted Software” Is a Dangerous Assumption
Supply chain attacks exploit trust, not vulnerabilities.
Defenders should:
- Monitor developer tools just as closely as browsers or office apps
- Treat update processes as high risk activity
2. Auto Update Traffic Deserves Visibility
Update mechanisms often:
- Use outbound connections
- Bypass proxies
- Evade inspection
Ensure you can:
- Log update related domains
- Detect redirects or unusual endpoints
- Correlate updates with new process execution
3. Selective Attacks Will Not Trigger Global Alerts
Threats like this will not show up as:
- VirusTotal spikes
- Widespread IOC feeds
Detection must be behavioral, not signature based.
What Defenders Should Do Now
My take is: don't use Notepad++ at all. But if you must, keep the following recommendations in mind. If the server was compromised and they could redirect the updates god knows what else they could have done, so just threat hunt, unistall and block it across al organization.
Immediate Actions
- Reinstall Notepad++ from the official site using the current version
- Verify digital signatures of installed binaries
- Run a full EDR or antivirus scan
Hardening Recommendations
- Restrict which applications are allowed to auto update
- Require signature validation for updater processes
- Log and alert on:
- Unsigned child processes
- Update tools spawning shells or network utilities
- Block outbound network connections from Notepad++ itself. A text editor should not need to make network connections; this is an easy win.
Threat Hunting Guidance
Hunt 1: Suspicious Child Processes
Look for:
notepad++.exe or updater processes spawning:
- cmd.exe
- powershell.exe
- mshta.exe
- rundll32.exe
This is not normal behavior for a text editor.
Hunt 2: Network Anomalies During Updates
Identify:
- Update traffic going to unexpected IP ranges
- TLS connections not matching known Notepad++ endpoints
- Geographic mismatches between update servers and vendor infrastructure
Hunt 3: Persistence Artifacts
Search for:
- New scheduled tasks created around update timestamps
- Registry run keys linked to Notepad++ directories
- DLLs dropped alongside legitimate binaries
Hunt 4: Timeline Correlation
Correlate:
- Update events
- First execution of new binaries
- Credential access or lateral movement shortly afterward
Supply chain compromises are usually stage one access, not the final payload.
Final Takeaway
This was not a failure of open source software.
It was a reminder that:
Trust is the real attack surface in modern environments.
Selective supply chain attacks will continue to happen quietly, patiently, and with precision.
Organizations that assume “everyone would be affected if it were real” will miss the next one.
Analysis of the Rapid7 Report
This report is important not because it found “another backdoor,” but because it shows how modern APT supply-chain attacks are evolving and what defenders should change in response.
1. This Confirms the Notepad++ Incident Was a Real APT Operation
Key takeaway
- The abuse of Notepad++ infrastructure was not hypothetical or speculative
- It was actively used by a long-running Chinese espionage group (Lotus Blossom / Billbug)
This elevates the incident from:
“possible supply-chain abuse”
to
“confirmed nation-state intrusion vector”
This matters for risk assessment, board communication, and future vendor trust decisions.
2. Selective Supply-Chain Attacks Are the New Default
The attackers:
- Did not broadly weaponize updates
- Delivered payloads only after Notepad++ execution
- Used conditional logic to remain invisible
Strategic insight
Absence of widespread detections does not mean absence of compromise. Detection strategies that rely on “blast radius” are obsolete.
This reinforces that:
Supply-chain compromise ≠ mass malware campaign
3. Abuse of Legitimate Tools Is the Core Strategy
The campaign deliberately blends:
- Legitimate signed software
- Legitimate installers (NSIS)
- Legitimate security tools (Bitdefender Submission Wizard)
- Legitimate Windows internals
This is not sophistication for its own sake. It is anti-detection by design.
Defender implication
Trust relationships are the attack surface. “Signed” and “legitimate” are no longer security boundaries.
4. DLL Side-Loading Remains Extremely Effective
Despite being a well-known technique, DLL side-loading remains:
- Reliable
- Quiet
- Difficult to detect in default EDR configurations
The attackers:
- Renamed trusted executables
- Dropped malicious DLLs with generic names
- Relied on default DLL search order behavior
Lesson
If your environment does not explicitly monitor DLL load paths, you are blind to this class of attack.
5. Custom Loaders Are Becoming More Important Than Payloads
Chrysalis itself is powerful, but what stands out more is:
- Multi-stage loaders
- Layered decryption
- Custom API resolution
- Obfuscation at every stage
Why this matters:
Payloads (Cobalt Strike, Metasploit) are increasingly disposable. Loaders are where tradecraft innovation now lives.
Defenders who focus only on payload detection will always be late.
6. Microsoft Warbird Abuse Is a Serious Escalation
The use of Microsoft Warbird is one of the most important findings.
Why it matters:
Warbird is undocumented, requires Microsoft-signed memory, and executes code through obscure Native API behavior. This allows attackers to:
- Avoid typical memory injection patterns
- Bypass heuristic detection
- Abuse OS internals defenders rarely monitor
Strategic shift
Attackers are no longer just evading security products. They are evading analyst expectations.
7. Living-Off-The-Land Is No Longer Enough to Describe This
This campaign blends:
- Custom malware
- Commodity frameworks
- Public research exploitation
- Undocumented OS features
This breaks the old dichotomy of:
“Custom APT malware” vs “commodity malware”
The reality is now:
Modular, adaptive tooling assembled per target
8. Execution Chains Matter More Than Single Alerts
The most defensible signal here was not:
- The backdoor
- The network traffic
- The payload
It was the execution sequence:
- Trusted editor runs
- Updater runs
- Unexpected installer executes
- Side-loaded DLL decrypts shellcode
- Memory execution follows
Key lesson
Attack detection must be chain-based, not event-based.
9. Persistence Was Conservative and Reliable
The malware:
- Preferred services
- Fell back to registry
- Included clean self-removal
This shows:
- Long-term access intent
- Operational maturity
- Desire to minimize forensic footprint
This is espionage tooling, not smash-and-grab malware.
10. Attribution Confidence Comes From Tradecraft Consistency
Attribution is credible because:
- Loader patterns match previous Billbug activity
- Tool reuse is consistent across years
- Execution flow aligns with prior research
This reinforces an important analytic point:
Attribution often comes from how, not what.
Big Picture Defender Takeaways
What This Campaign Really Tells Us
Supply-chain attacks will increasingly be:
- Selective
- Quiet
- Long-lived
Developer tools are high-value targets. Update mechanisms deserve the same scrutiny as browsers. Native API abuse will increase. Payload detection alone is insufficient.
Full research attribution with TTPs: https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/
