Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Notepad++ Supply Chain Attack Attributed to China-Linked
Notepad++ Supply Chain Attack Attributed to China-Linked
NEWS

Notepad++ Supply Chain Attack Attributed to China-Linked

Notepad++ releases emergency v8.9.2 patch after a China-linked APT group hijacked the update mechanism for six months, deploying the Chrysalis backdoor to...

Dylan H.

News Desk

February 18, 2026
3 min read

Trusted Software Weaponized

Notepad++ — one of the most widely used text editors with over 50 million downloads — has released an emergency v8.9.2 update with a "double lock" security fix. A China-linked APT group hijacked the update mechanism from June through December 2025, deploying backdoors to targeted organizations worldwide.


Attack Overview

FieldDetails
Target SoftwareNotepad++ (all versions prior to v8.9.2)
Attack WindowJune 2025 — December 2025 (~6 months)
MethodUpdate mechanism hijack via hosting provider compromise
PayloadChrysalis backdoor
TargetsFinance, telecom, government, critical infrastructure
RegionsSoutheast Asia, South America, United States, Europe

How the Supply Chain Was Compromised

The attackers did not compromise Notepad++ source code or its GitHub repository. Instead, they intercepted the update delivery pipeline:

1. Hosting Provider Compromise
   └─ Attackers gained access to hosting provider serving updates
 
2. Update Interception
   └─ Modified update packages in transit for targeted IP ranges
 
3. Selective Targeting
   └─ Only delivered malicious updates to matching target profiles
 
4. Chrysalis Deployment
   └─ Backdoor installed silently alongside legitimate update
 
5. C2 Rotation
   └─ Servers, downloaders, and payloads constantly rotated

The selective targeting made the attack extremely difficult to detect — the vast majority of users received legitimate updates.


Attribution: Disputed but China-Linked

AnalystAttributionReasoning
Kevin BeaumontViolet Typhoon (APT31/Zirconium)Infrastructure overlap with known APT31 C2 servers
Rapid7 ResearchLotus Blossom (Spring Dragon)Chrysalis backdoor code similarities to known Lotus Blossom tooling

Chrysalis Backdoor Capabilities

  • Encrypted C2 communications using custom protocol over HTTPS
  • File exfiltration with automated staging and compression
  • Credential harvesting from browsers and password managers
  • Keylogging with application-aware context capture
  • Screenshot capture triggered by specific application windows
  • Lateral movement tools for internal network reconnaissance

Targeted Sectors

SectorPercentage of Known Victims
Financial Services35%
Telecommunications25%
Government Agencies20%
Critical Infrastructure15%
Other5%

The "Double Lock" Fix

Notepad++ v8.9.2 implements two new security mechanisms:

  1. Code-signed update verification — All update packages cryptographically signed with a new dedicated signing key
  2. Pinned certificate validation — Update client pins the expected TLS certificate of the update server, preventing MitM even if a hosting provider is compromised

Defensive Recommendations

  1. Update to Notepad++ v8.9.2 immediately
  2. Scan for Chrysalis indicators — Check endpoints that received updates between June-December 2025
  3. Review network logs — Look for connections to known Chrysalis C2 infrastructure
  4. Audit all third-party update mechanisms in your environment

Sources

  • Kaspersky Securelist — Chrysalis: Supply Chain Attack via Notepad++ Update Mechanism
  • Dark Reading — Chinese Hackers Hijack Notepad++ Updates for Six Months
  • The Hacker News — Notepad++ Official Update Mechanism Hijacked
  • Help Net Security — Notepad++ Supply Chain Attack IOCs and Targets

Related Reading

  • Lotus Blossom APT Compromises Notepad++ Updates to Deploy
  • OpenClaw AI Agent Flaws Enable Prompt Injection, 1-Click
  • Lazarus Group Plants 192 Malicious Packages in npm and PyPI
#Notepad++#Supply Chain#China#APT#Violet Typhoon#Lotus Blossom#Chrysalis#Backdoor

Related Articles

OpenClaw AI Agent Flaws Enable Prompt Injection, 1-Click

China's CNCERT has warned that OpenClaw (formerly Clawdbot/Moltbot), the viral self-hosted AI agent, carries over 250 disclosed vulnerabilities including...

6 min read

Google Disrupts Massive Chinese Espionage Campaign

Google's Threat Intelligence Group dismantles UNC2814, a China-linked operation that deployed a novel backdoor called GRIDTIDE abusing Google Sheets API...

3 min read

Leaked Documents Reveal China's 'Expedition Cloud' Cyber

Technical documents leaked from a malware-infected developer device expose a Chinese military-linked training platform that replicates the critical...

4 min read
Back to all News