Frequently Asked Questions About Notepad++ Supply Chain Compromise
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。 首先,我需要通读整篇文章,抓住关键点。文章讲的是Notepad++的更新基础设施被威胁分子入侵,导致流量被重定向到攻击者控制的网站,目的是进行针对性的间谍活动。事件发生在2025年6月开始,持续了大约六个月。攻击者是名为Lotus Blossom的中国威胁行为者。Notepad++已经发布了8.9.1版本,增加了XML签名验证来提高安全性。 接下来,我要把这些信息浓缩到100字以内。要包括事件的时间、影响、攻击者身份、解决措施等关键点。同时,语言要简洁明了,避免使用复杂的术语。 可能的结构是:时间、事件、攻击者、影响范围、解决措施。比如:“2025年6月起,Notepad++更新基础设施遭中国威胁行为者Lotus Blossom入侵,导致流量被重定向至攻击者控制网站进行间谍活动。事件持续约六个月后已解决,Notepad++发布8.9.1版本修复。”这样大概在100字左右。 检查一下是否遗漏了重要信息:没有提到漏洞CVE编号和Tenable的插件信息,但用户只要求总结文章内容,所以可以忽略这些细节。 最后确认语言是否符合要求:直接描述事件,不使用开头词。 </think> 2025年6月起,Notepad++更新基础设施遭中国威胁行为者Lotus Blossom入侵,导致流量被重定向至攻击者控制网站进行间谍活动。事件持续约六个月后已解决,Notepad++发布8.9.1版本修复。 2026-2-3 14:16:23 Author: securityboulevard.com(查看原文) 阅读量:2 收藏

Threat actors compromised the update infrastructure for Notepad++, redirecting traffic to an attacker controlled site for targeted espionage purposes.

Key takeaways:

  1. Beginning in June 2025, threat actors compromised the infrastructure Notepad++ uses to distribute software updates.
     
  2. The issue has been addressed and Notepad++ have released 8.9.1 which now includes XML signature validation (XMLDSig) for security updates.
     
  3. Reports suggest that the attack was carried out by a Chinese threat actor known as Lotus Blossom.

Background

Tenable’s Research Special Operations (RSO) team has compiled this blog to answer Frequently Asked Questions (FAQ) regarding the disclosure of a supply chain compromise of Notepad++.

FAQ

What happened with Notepad++?

On February 2, Don Ho, creator of Notepad ++, a source code and text editor for Windows, published a blog detailing the investigation into a supply chain security incident.

What kind of security incident is this?

According to the blog post, threat actors compromised the infrastructure by which Notepad++ would distribute software updates. This compromise allowed the attackers to redirect update traffic from its intended destination (notepad-plus-plus dot org) to an attacker-controlled site.

When did this security incident begin?

The security incident began in June 2025.

How long did the security incident last for?

Roughly six months. The compromised infrastructure was accessible until September 2, 2025. However, because the attackers possessed valid credentials for the internal services of the infrastructure provider, they were able to continue redirecting Notepad++ update traffic until December 2, 2025.

Was this incident known prior to February 2?

Yes, Ho published a blog post on December 9 regarding the release of version 8.8.9 and noted that security experts “reported incidents of traffic hijacking affecting Notepad++.” The full scope of the security incident wasn’t known at the time as the investigation was ongoing.

Has this attack been linked to a specific threat actor?

Yes, reports suggest that the attack was carried out by a Chinese threat actor known as Lotus Blossom, also known as Bilbug, Raspberry Typhoon or Thrip.

What do we know about Lotus Blossom?

Lotus Blossom has been operating since 2009, known for deploying various backdoor malware. Regionally, the group has a penchant for targeting entities across Asia including government and the defense sector.

How widespread was this Notepad++ attack?

Despite the widespread usage of Notepad++, reports indicate that Lotus Blossom focused more on espionage of certain targets through the deployment of malware rather than financially motivated cybercrime like ransomware or extortion.

Were there any vulnerabilities associated with this security incident?

No, no CVEs have been assigned for this security incident because the attacks centered on compromising the Notepad++ infrastructure provider and updater.

Are there software updates available for this security incident?

Yes, Notepad++ have released 8.9.1 which now includes XML signature validation (XMLDSig) for security updates with additional signing enforcement expected in version 8.9.2.

Affected Product Affected Versions Fixed Versions
Notepad ++ 8.9 and lower 8.9.1 and above

Has Tenable released any product coverage for these vulnerabilities?

Yes, a Tenable plugin to identify vulnerable versions of Notepad++ can be found here.

This link will display all available plugins for these vulnerabilities, including upcoming plugins in our Plugins Pipeline.

Get more information

Join on Tenable Connect and engage with us in the for further discussions on the latest cyber threats.

Learn more about , the Exposure Management Platform for the modern attack surface.

*** This is a Security Bloggers Network syndicated blog from Tenable Blog authored by Satnam Narang. Read the original post at: https://www.tenable.com/blog/frequently-asked-questions-about-notepad-supply-chain-compromise


文章来源: https://securityboulevard.com/2026/02/frequently-asked-questions-about-notepad-supply-chain-compromise/
如有侵权请联系:admin#unsafe.sh