overview
Kaspersky researchers uncovered multiple undocumented infection chains in a supply chain attack targeting Notepad++ users from July to October 2025, where attackers compromised the software's update mechanism to deliver Cobalt Strike Beacons and other malware to a limited set of victims, including organizations in Southeast Asia and financial entities.
The attack spanned four months, with attackers rotating command-and-control (C2) servers, downloaders, and payloads to evade detection. Initial activity began in July2025, paused briefly, resumed in early August, continued into mid-September, and evolved again in early October. Kaspersky telemetry detected these chains affecting about a dozen machines, with all attempts blocked by their solutions.
Attackers distributed malicious update.exe files via compromised Notepad++ updater URLs, such as http://45.76.155[.]202/update/update.exe and http://45.32.144[.]255/update/update.exe.
These were NSIS installers that performed reconnaissance—executing commands like cmd /c"whoami&&tasklist&&systeminfo&&netstat -ano"> a.txt—and uploaded results to temp[.]sh via curl, then dropped next-stage payloads like alien.dll to %APPDATA%\Adobe\Scripts.
Payloads used DLL sideloading and shellcode padding to obscure execution, targeting Windows systems via the WinGUp updater.
Infections hit individuals in Vietnam, El Salvador, and Australia, plus organizations: a Philippine government entity, an El Salvador financial organization, and a Vietnam IT service provider. Attacks showed targeting toward South Asian political and economic interests.
Notepad++ released version 8.8.9 with signature verification for updates. Recommendations include verifying update signatures, monitoring network traffic for anomalies, behavioral analysis of updaters, and blocking known IoCs like malicious domains and file hashes. Enterprises should enforce update controls and avoid unverified open-source tools.
Supply chain attacks exploit trusted software updaters, as seen here with Notepad++'s WinGUp, where DNS manipulation or network compromise redirected users to malicious URLs. Open-source projects like Notepad++ are vulnerable due to limited resources for securing update pipelines, evading traditional antivirus via low-entropy files and legitimate signing mimicry. This fits a trend of targeted operations over mass campaigns, often linked to state actors.
Observed Malicious File Hashes
|
Stage/Chain |
File |
SHA1 Hash |
Notes |
|
Chain #1/2 |
update.exe |
90e677d7ff5844407b9c073e3b7e896e078e11cd |
Cobalt Strike delivery |
|
Chain #2 |
update.exe |
573549869e84544e3ef253bdba79851dcde4963a |
NSIS installer with recon |
|
Chain #2 |
alien.dll |
6444dab57d93ce987c22da66b3706d5d7fc226da |
Dropped payload |
|
Chain #2 |
update.exe |
13179c8f19fbf3d8473c49983a199e6cb4f318f0 |
Cobalt Strike variant |
|
Chain #3 |
update.exe |
d7ffd7b588880cf61b603346a3557e7cce648c93 |
Simplified NSIS dropper |
Key Malicious URLs and Recon Commands
|
Component |
Details |
Purpose |
|
C2 URLs |
http://45.76.155[.]202/update/update.exe |
Malicious update distribution |
|
Recon Endpoint |
temp[.]sh (via curl) |
System info upload |
|
Shell Commands |
whoami && tasklist && systeminfo && netstat -ano |
Gather host details |
SUPPORTING DOCUMENTATION