Notepad++ boosts update security with ‘double-lock’ mechanism
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。首先,我需要通读整篇文章,抓住主要信息。 文章讲的是Notepad++更新机制的安全问题。最近他们被供应链攻击了,所以引入了“双锁”设计来解决这个问题。双锁包括验证签名安装包和检查XML签名。此外,还移除了libcurl.dll和一些不安全的cURL选项,限制插件管理执行,并允许用户在安装时禁用自动更新。 还有提到之前被攻击的情况,黑客用了Chrysalis后门,持续了六个月。建议用户升级到8.9.2版本,并从官方下载安装包。 现在要总结这些内容,控制在100字以内。重点包括:双锁机制、验证签名、移除组件、限制执行、禁用更新选项、修复漏洞、升级建议。 可能的结构是:Notepad++ 为应对供应链攻击,升级了更新机制,采用双锁设计验证签名安装包和XML文件,并移除风险组件和限制插件管理执行。用户可禁用自动更新并应升级至最新版本以确保安全。 这样应该能涵盖主要信息,并且简洁明了。 </think> Notepad++ 为应对供应链攻击问题升级了更新机制,采用“双锁”设计验证签名安装包和 XML 文件,并移除风险组件及限制插件管理执行。用户可禁用自动更新并应升级至最新版本以确保安全。 2026-2-17 18:30:30 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

Notepad++ boosts update security with ‘double-lock’ mechanism

Notepad++ has adopted a “double-lock” design for its update mechanism to address recently exploited security gaps that resulted in a supply-chain compromise.

The new mechanism landed in Notepad++ version 8.9.2, announced yesterday, although work on it began in version 8.8.9 with implementing the verification of the signed installer from GitHub.

The second part of the double-lock system is checking the signed XML from the notepad-plus-plus.org domain. In practice, this means that the XML file returned from the update service is digitally signed (XMLDSig).

Wiz

The combination of the two verification mechanisms adds to a more robust "and effectively unexploitable" update process, says the team behind the massively popular open-source text and source code editor.

Additional security-oriented changes applied to the auto-updater include:

  • Removal of libcurl.dll to eliminate DLL side-loading risk
  • Removal of two unsecured cURL SSL options: CURLSSLOPT_ALLOW_BEAST and CURLSSLOPT_NO_REVOKE
  • Restriction of plugin management execution to programs signed with the same certificate as WinGUp

The new announcement also notes that users can exclude the auto-updater during UI installation or deploy the MSI package with: msiexec /i npp.8.9.2.Installer.x64.msi NOUPDATER=1

Vulnerable update model (left) and new, secure model (right)
Vulnerable update model (left) and new, secure model (right)
Source: Notepad++

Earlier this month, Notepad++  and Rapid7 researchers disclosed that the update infrastructure was compromised in a six-month-long campaign attributed to Lotus Blossom, a threat group linked to China.

Starting in June 2025, the bad actor compromised the hosting provider that ran the Notepad++ updater and selectively redirected update requests from specific users to malicious servers.

The attacks exploited weak update verification controls used in older versions of the software, and continued until their discovery on December 2, 2025.

Rapid7’s analysis revealed that the Chinese hackers used a custom backdoor called “Chrysalis” as part of the attack chain.

Apart from the newly introduced security measures, the project immediately switched to a different hosting provider, rotated credentials, and fixed flaws exploited in the discovered attacks.

The recommended action for all Notepad++ users is to upgrade to version 8.9.2, and ensure that installers are always downloaded from the official domain, notepad-plus-plus.org.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/notepad-plus-plus-boosts-update-security-with-double-lock-mechanism/
如有侵权请联系:admin#unsafe.sh