Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks

February 26, 2026

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

February 26, 2026

Google Disrupts ‘Prolific’ and ‘Elusive’ China-Linked Hacking Campaign

February 26, 2026
Facebook X (Twitter) Instagram
Thursday, February 26
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
News

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

Team-CWDBy Team-CWDFebruary 26, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver malware to targets of interest.

The version 8.9.2 update incorporates what maintainer Don Ho calls a “double lock” design that aims to make the update process “robust and effectively unexploitable.” This includes verification of the signed installer downloaded from GitHub (implemented in version 8.8.9 and later), as well as the newly added verification of the signed XML returned by the update server at notepad-plus-plus[.]org.

In addition to these enhancements, security-focused changes have been introduced to WinGUp, the auto-updater component –

  • Removal of libcurl.dll to eliminate DLL side-loading risk
  • Removal of two unsecured cURL SSL options: CURLSSLOPT_ALLOW_BEAST and CURLSSLOPT_NO_REVOKE
  • Restriction of plugin management execution to programs signed with the same certificate as WinGUp

The update also addresses a high-severity vulnerability (CVE-2026-25926, CVSS score: 7.3) that could result in arbitrary code execution in the context of the running application.

“An Unsafe Search Path vulnerability (CWE-426) exists when launching Windows Explorer without an absolute executable path,” Ho said. “This may allow execution of a malicious explorer.exe if an attacker can control the process working directory. Under certain conditions, this could lead to arbitrary code execution in the context of the running application.”

The development comes weeks after Notepad++ disclosed that a breach at the hosting provider level enabled threat actors to hijack update traffic starting June 2025 and redirect requests from certain users to malicious servers to serve a poisoned update. The issue was detected in early December 2025.

According to Rapid7 and Kaspersky, the tampered updates enabled the attackers to deliver a previously undocumented backdoor dubbed Chrysalis. The supply chain incident, tracked under the CVE identifier CVE-2025-15556 (CVSS score: 7.7), has been attributed to a China-nexus hacking group called Lotus Panda.

The attack is assessed to have targeted individuals and organizations located in Vietnam, El Salvador, Australia, the Philippines, the U.S., South America, and Europe, spanning cloud hosting, energy, financial, government, manufacturing, and software development sectors, per data from Kaspersky and Palo Alto Networks Unit 42.

Notepad++ users are recommended to update to version 8.9.2, and make sure that the installers are downloaded from the official domain.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFormer Defense Contractor Boss Gets 7+ Years for Selling Zero Days
Next Article Chinese AI Firms Hit Claude with Distillation Attacks, Anthropic Warns
Team-CWD
  • Website

Related Posts

News

Darktrace Flags 32 Million Phishing Emails in 2025 as Identity Attacks

February 26, 2026
News

Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024

February 26, 2026
News

Global Cyber Agencies Urge Immediate Patching of Cisco SD-WAN Zero Day

February 26, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How it preys on personal data – and how to stay safe

October 23, 2025

How chatbots can help spread scams

October 14, 2025

In memoriam: David Harley

November 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.