Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我需要仔细阅读这篇文章,理解其主要内容。 文章讲的是Notepad++发布了安全更新,修复了被中国威胁行为者利用的漏洞。他们通过劫持软件更新机制来分发恶意软件。新版本8.9.2增加了“双锁”设计,包括验证GitHub下载的签名安装程序和更新服务器返回的签名XML。此外,还移除了libcurl.dll和一些不安全的cURL选项,并限制了插件管理器的执行权限。还修复了一个高危漏洞CVE-2026-25926,涉及任意代码执行。之前在6月被攻击者劫持更新流量,导致分发恶意软件Chrysalis,归因于莲花熊猫组织。 接下来,我需要将这些信息浓缩到100字以内。要抓住关键点:Notepad++修复漏洞、双锁设计、移除风险、修复高危漏洞、莲花熊猫攻击。 然后组织语言,确保流畅且信息完整。比如:“Notepad++发布8.9.2版本修复安全漏洞,采用‘双锁’设计防止恶意软件分发,并移除DLL侧加载风险及不安全选项。同时修复高危漏洞CVE-2026-25926。此前中国黑客组织莲花熊猫通过劫持更新机制分发恶意软件Chrysalis。” 检查字数是否在限制内,并确保所有关键点都涵盖。 </think> Notepad++发布8.9.2版本修复安全漏洞,采用“双锁”设计防止恶意软件分发,并移除DLL侧加载风险及不安全选项。同时修复高危漏洞CVE-2026-25926。此前中国黑客组织莲花熊猫通过劫持更新机制分发恶意软件Chrysalis。 2026-2-18 07:40:0 Author: thehackernews.com(查看原文) 阅读量:2 收藏

Vulnerability / Application Security

Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver malware to targets of interest.

The version 8.9.2 update incorporates what maintainer Don Ho calls a "double lock" design that aims to make the update process "robust and effectively unexploitable." This includes verification of the signed installer downloaded from GitHub (implemented in version 8.8.9 and later), as well as the newly added verification of the signed XML returned by the update server at notepad-plus-plus[.]org.

In addition to these enhancements, security-focused changes have been introduced to WinGUp, the auto-updater component -

  • Removal of libcurl.dll to eliminate DLL side-loading risk
  • Removal of two unsecured cURL SSL options: CURLSSLOPT_ALLOW_BEAST and CURLSSLOPT_NO_REVOKE
  • Restriction of plugin management execution to programs signed with the same certificate as WinGUp

The update also addresses a high-severity vulnerability (CVE-2026-25926, CVSS score: 7.3) that could result in arbitrary code execution in the context of the running application.

"An Unsafe Search Path vulnerability (CWE-426) exists when launching Windows Explorer without an absolute executable path," Ho said. "This may allow execution of a malicious explorer.exe if an attacker can control the process working directory. Under certain conditions, this could lead to arbitrary code execution in the context of the running application."

The development comes weeks after Notepad++ disclosed that a breach at the hosting provider level enabled threat actors to hijack update traffic starting June 2025 and redirect requests from certain users to malicious servers to serve a poisoned update. The issue was detected in early December 2025.

According to Rapid7 and Kaspersky, the tampered updates enabled the attackers to deliver a previously undocumented backdoor dubbed Chrysalis. The supply chain incident, tracked under the CVE identifier CVE-2025-15556 (CVSS score: 7.7), has been attributed to a China-nexus hacking group called Lotus Panda.

Notepad++ users are recommended to update to version 8.9.2, and make sure that the installers are downloaded from the official domain.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/notepad-fixes-hijacked-update-mechanism.html
如有侵权请联系:admin#unsafe.sh