The attack successfully exploited the trust associated with the Notepad++ automatic update process (GUP.exe). By compromising the shared hosting infrastructure used by the project, the attackers were able to intercept and selectively redirect update requests from specific users—primarily within the telecommunications, finance, and government sectors in East Asia—to attacker-controlled servers.
The Infection Chain:
- Redirection: Legitimate notepad++.exe initiates GUP.exe to check for updates.
- Malicious Download: Instead of the legitimate package, GUP.exe receives a redirected response pointing to a malicious NSIS installer (update.exe) hosted on a rogue server.
- Sideloading Execution: The malicious installer drops a renamed legitimate executable, BluetoothService.exe (originally Bitdefender Submission Wizard), and a malicious DLL named log.dll.
- Payload Deployment: When executed, BluetoothService.exe sideloads log.dll, which decrypts and executes the Chrysalis shellcode.
Chrysalis Backdoor Capabilities: Chrysalis is a bespoke, modular implant designed for long-term espionage. Its features include:
- Full remote command execution and interactive shell access.
- File system manipulation (upload/download).
- Process execution and termination.
- Communication with Command and Control (C2) servers.
- Deployment of secondary payloads, often utilising the 'Microsoft Warbird' obfuscation framework.
Vulnerable Versions:
The compromise affects users who utilised the built-in auto-update feature during the active window of the attack.
- Affected Components: Notepad++ Auto-Updater (GUP.exe) in versions prior to 8.8.9.
- Note: Users who downloaded the full installer manually from the official website during this period may not be affected, as the attack specifically targeted the update verification mechanism.
Mitigations:
Organisations are advised to implement the following controls immediately:
- Network Blocking: Block traffic to known C2 domains and malicious IPs associated with the campaign.
- Endpoint Detection: Configure EDR solutions to flag instances of BluetoothService.exe running from non-standard directories or spawning unexpected child processes.
- Signature Enforcement: Ensure that software execution policies require valid digital signatures for all executables.
Recommendations:
Security teams should prioritise the following actions to remediate the threat and ensure environment integrity:
- Update Immediately: Ensure all instances of Notepad++ are upgraded to version 8.9.1 or later.
- Hunt for Indicators of Compromise (IOCs)
- Audit Update Logs: Review network logs from June to December 2025 for connections to the identified malicious infrastructure.
- Re-installation: For any system suspected of attempting an update during the compromised window, a full uninstallation of Notepad++ followed by a clean installation from the official domain is recommended to remove any dormant artifacts.
Don’t forget to share this article