Home > Blog > Notepad++ Update Mechanism Hijacked in Targeted Supply Chain Attack
News

Notepad++ Update Mechanism Hijacked in Targeted Supply Chain Attack

By whois-secure March 16, 2026 11 views

Notepad++ Update Mechanism Hijacked in Targeted Supply Chain Attack

In a sophisticated supply chain attack spanning from June to December 2025, state-sponsored hackers compromised the update mechanism of Notepad++, a widely used open-source text editor. This breach allowed attackers to deliver malicious payloads to select users, primarily targeting organizations in East Asia's telecommunications and financial sectors, as well as government entities in the Philippines and Vietnam.

Timeline and Methodology of the Attack

The attack commenced in June 2025 when threat actors gained unauthorized access to the shared hosting server of Notepad++. By September 2, 2025, the attackers had fully compromised the server, enabling them to intercept and redirect update traffic from the official Notepad++ domain to servers under their control. This redirection facilitated the distribution of malicious software disguised as legitimate updates.

Even after the initial compromise was addressed, the attackers maintained access to internal service credentials until December 2, 2025. This persistent access allowed them to continue manipulating the update mechanism, ensuring the delivery of malicious payloads to targeted users over an extended period.

Attribution and Targeted Entities

Multiple independent security researchers have attributed this campaign to a Chinese state-sponsored group, with some assessments pointing specifically to the Lotus Blossom group, also known as Violet Typhoon or APT31. The attackers demonstrated highly selective targeting, focusing on organizations within the telecommunications and financial sectors across East Asia, as well as government entities in the Philippines and Vietnam.

According to Kaspersky researchers, the attackers employed three primary execution chains between July and October 2025. They continuously changed command-and-control server addresses, downloaders, and final payloads to evade detection. This adaptability underscores the sophistication and determination of the threat actors involved.

Technical Details and Indicators of Compromise

The attackers utilized a variety of techniques to maintain persistence and avoid detection. They employed the Chrysalis backdoor, a tool previously associated with the Lotus Blossom group. This backdoor allowed for remote control over infected systems, enabling data exfiltration and further network compromise.

Security firm Rapid7 conducted an in-depth analysis of the Chrysalis backdoor, highlighting its capabilities and the infrastructure used by the attackers. Their research provides valuable insights into the methods employed and offers indicators of compromise (IoCs) to assist organizations in identifying potential breaches.

Implications for Software Supply Chain Security

This incident highlights the critical importance of securing software supply chains, especially for widely used open-source applications. The compromise of Notepad++'s update mechanism demonstrates how attackers can exploit trusted distribution channels to deliver malicious payloads to unsuspecting users.

Organizations are advised to implement robust security measures, including:

  • Verifying the integrity of software updates through digital signatures and checksums.
  • Monitoring network traffic for unusual patterns that may indicate redirection to unauthorized servers.
  • Conducting regular security audits of hosting infrastructure and access controls.
  • Educating users about the risks associated with software updates and the importance of downloading updates from verified sources.

By adopting these practices, organizations can enhance their resilience against supply chain attacks and protect their systems from unauthorized access and data breaches.

Conclusion

The Notepad++ supply chain attack serves as a stark reminder of the evolving tactics employed by state-sponsored threat actors. It underscores the necessity for continuous vigilance and the implementation of comprehensive security measures to safeguard software supply chains. As attackers become more sophisticated, the cybersecurity community must remain proactive in identifying and mitigating emerging threats.

For further reading and detailed analyses of this attack, refer to the following sources:

Tags: Notepad++ supply chain attack cybersecurity state-sponsored hackers software security
CyberEdge Learning
Level Up Your Cybersecurity Skills
Liked this article? Go deeper with hands-on training, certification prep, and real-world labs at CyberEdge Learning.
Start Free →