Discussion
Loading...

Post

Log in
  • About
  • Code of conduct
  • Privacy
  • About Bonfire
Taggart
Taggart
@mttaggart@infosec.exchange  ·  activity timestamp 4 days ago

Notepad++ versions and update mechanisms had been compromised since June until December 2025. Please update to 8.9.1 wherever you have this tool. It's unclear what malicious versions of the tool might do. I Recommend activating incident response for affected hosts.

https://notepad-plus-plus.org/news/hijacked-incident-info-update/

  • Copy link
  • Flag this post
  • Block
Vorsos
Vorsos
@Vorsos@beige.party replied  ·  activity timestamp 4 days ago

@mttaggart What’s worse, the built-in Notepad remains infected with Copilot.

  • Copy link
  • Flag this comment
  • Block
Come On Giant Asteroid!
Come On Giant Asteroid!
@VE2UWY@mastodon.radio replied  ·  activity timestamp 4 days ago

@mttaggart

Ugh. Done. Thanks!

#Notepad++ #NotepadPlusPlus

  • Copy link
  • Flag this comment
  • Block
Kevin Mirsky :donor:
Kevin Mirsky :donor:
@kevinmirsky@infosec.exchange replied  ·  activity timestamp 4 days ago

@mttaggart ...So people who did not update their software were not impacted. Checkmate, security nerds!!1

  • Copy link
  • Flag this comment
  • Block
Taggart
Taggart
@mttaggart@infosec.exchange replied  ·  activity timestamp 4 days ago

@kevinmirsky Security by obsolescence wins again, baybee!

  • Copy link
  • Flag this comment
  • Block
Taggart
Taggart
@mttaggart@infosec.exchange replied  ·  activity timestamp 4 days ago

@kevinmirsky Except actually not, per other replies.

  • Copy link
  • Flag this comment
  • Block
Kevin Mirsky :donor:
Kevin Mirsky :donor:
@kevinmirsky@infosec.exchange replied  ·  activity timestamp 4 days ago

@mttaggart yeah, you'd have to have had it installed prior to compromise and then never updated.

  • Copy link
  • Flag this comment
  • Block
Kevin Beaumont
Kevin Beaumont
@GossiTheDog@cyberplace.social replied  ·  activity timestamp 4 days ago

@mttaggart it was a remote access Trojan with a C2, I did a write up in December, nation state espionage stuff

https://doublepulsar.com/small-numbers-of-notepad-users-reporting-security-woes-371d7a3fd2d9

Medium

Small numbers of Notepad++ users reporting security woes

Auto updates are fun.
  • Copy link
  • Flag this comment
  • Block
Taggart
Taggart
@mttaggart@infosec.exchange replied  ·  activity timestamp 4 days ago

Based on release posts, impacted versions are 8.8.6, 8.8.7, and 8.8.8.

UPDATE: Don't look at just these versions, as the update may not have bumped version numbers.

  • Copy link
  • Flag this comment
  • Block
Taggart
Taggart
@mttaggart@infosec.exchange replied  ·  activity timestamp 4 days ago

Known IOCs here, with more likely to come: https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/

Rapid7

The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit

Rapid7 Labs, together with the Rapid7 MDR team, has uncovered a sophisticated campaign attributed to the Chinese APT group Lotus Blossom.
  • Copy link
  • Flag this comment
  • Block
Kevin Beaumont
Kevin Beaumont
@GossiTheDog@cyberplace.social replied  ·  activity timestamp 4 days ago

@mttaggart it was any version impacted as it was the auto update process

  • Copy link
  • Flag this comment
  • Block
Taggart
Taggart
@mttaggart@infosec.exchange replied  ·  activity timestamp 4 days ago

@GossiTheDog Right but the server was compromised between September and December, which maps to those versions. So if you're looking for potentially compromised versions, those would be the ones, right?

  • Copy link
  • Flag this comment
  • Block
scottley
scottley
@scottley@infosec.exchange replied  ·  activity timestamp 4 days ago

@mttaggart @GossiTheDog

Indicators of compromise of users would look like post exploit behavior of an RCE vuln in the auto updater process... I haven't looked at details, but if you have process logging (4688s), if you find processes started by the notepad++ process, that is your haystack (not all updates would have been targeted, let's say...) to find the needles, you'll need to go hunting for the malicious update returned by hostile auto updater service.

  • Copy link
  • Flag this comment
  • Block
Kevin Beaumont
Kevin Beaumont
@GossiTheDog@cyberplace.social replied  ·  activity timestamp 4 days ago

@mttaggart no, they delivered a Trojanized executable via the update process - not a new version.

  • Copy link
  • Flag this comment
  • Block
Taggart
Taggart
@mttaggart@infosec.exchange replied  ·  activity timestamp 4 days ago

@GossiTheDog Ah I see. So the update process didn't bump the version number?

  • Copy link
  • Flag this comment
  • Block
Kevin Beaumont
Kevin Beaumont
@GossiTheDog@cyberplace.social replied  ·  activity timestamp 4 days ago

@mttaggart not necessarily. It would just download any .exe you set and run it, there was no signature checking etc.

  • Copy link
  • Flag this comment
  • Block
Shrouded Scribe
Shrouded Scribe
@shroudedscribe@fosstodon.org replied  ·  activity timestamp 4 days ago

@mttaggart It's a shame that every app with auto-update isn't verifying the installer's integrity first. I'm glad this is part of the process for Notepad++ now, but it makes me nervous thinking about how many apps don't do this.

  • Copy link
  • Flag this comment
  • Block
WinterKnight :donor:
WinterKnight :donor:
@winterknight1337@infosec.exchange replied  ·  activity timestamp 4 days ago

@mttaggart ugh. This hit my gaming rig. Do I need to set up elastic at home now? I really don’t want to, but I’m beginning to think it’s not a bad idea given how awful default windows logging is 🙃

  • Copy link
  • Flag this comment
  • Block
Taggart
Taggart
@mttaggart@infosec.exchange replied  ·  activity timestamp 4 days ago

@winterknight1337 Sysmon is sufficient, but if you have other machines as well, the Elastic Agent might make sense.

  • Copy link
  • Flag this comment
  • Block
WinterKnight :donor:
WinterKnight :donor:
@winterknight1337@infosec.exchange replied  ·  activity timestamp 4 days ago

@mttaggart yeah, I haven’t even installed sysmon on the personal rig, because well. It’s for games not work. But I think that’ll be changing now. Is Tay’s sysmon config still the go to? Or is there a better option nowadays?

  • Copy link
  • Flag this comment
  • Block
Taggart
Taggart
@mttaggart@infosec.exchange replied  ·  activity timestamp 4 days ago

@winterknight1337 This is it: https://github.com/olafhartong/sysmon-modular

Performance impact is minimal, but I would increase the default logfile size to ~1GB.

GitHub

GitHub - olafhartong/sysmon-modular: A repository of sysmon configuration modules

A repository of sysmon configuration modules. Contribute to olafhartong/sysmon-modular development by creating an account on GitHub.
  • Copy link
  • Flag this comment
  • Block
WinterKnight :donor:
WinterKnight :donor:
@winterknight1337@infosec.exchange replied  ·  activity timestamp 4 days ago

@mttaggart awesome. Guess my project tonight is backing up my stuff and reinstalling windows. Maybe I’ll turn it into a blog post too. Thanks for the suggestion!

  • Copy link
  • Flag this comment
  • Block

BT Free Social

BT Free is a non-profit organization founded by @ozoned@btfree.social . It's goal is for digital privacy rights, advocacy and consulting. This goal will be attained by hosting open platforms to allow others to seamlessly join the Fediverse on moderated instances or by helping others join the Fediverse.

BT Free Social: About · Code of conduct · Privacy ·
Bonfire social · 1.0.1 no JS en
Automatic federation enabled
Log in
  • Explore
  • About
  • Code of Conduct