Notepad++ fixed updater bugs that allowed malicious update hijacking
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”之类的开头。我得先仔细看看这篇文章讲的是什么。 文章标题是Notepad++修复了更新器的漏洞,这个漏洞曾被恶意劫持。里面提到Notepad++的更新器存在一个安全问题,攻击者可以利用这个漏洞劫持更新流量,因为文件认证不够强。 然后,安全研究人员Kevin Beaumont报告了多个用户遇到的安全事件,这些攻击主要针对东亚的电信和金融公司,可能来自中国。攻击者可能利用了Notepad++的漏洞。 Notepad++在11月中旬发布了更新,修复了GUP/WinGUP更新器的问题。原来的问题在于更新器使用HTTP协议,容易被劫持。虽然现在改成了HTTPS,但ISP级别的劫持还是有可能。旧版本使用自签名证书,导致验证不严。 Notepad++ 8.8.8版本强制更新只能从GitHub下载,这样拦截就难多了。文章还提到一些入侵迹象,比如gup.exe联系其他域名、启动异常进程、临时文件夹出现可疑文件等。 不过具体的攻击手法还不清楚,Beaumont猜测可能是ISP级别的劫持。Notepad++确认了这个问题,并修复了验证机制。 总结一下,文章主要讲的是Notepad++修复了一个严重的更新器漏洞,防止恶意软件通过劫持更新来传播。用户需要关注这些入侵迹象,并确保使用最新版本的软件。 现在我要把这些信息浓缩到100字以内。重点包括:漏洞类型、攻击方式、修复措施以及入侵迹象。 </think> Notepad++修复了其更新器中的一个漏洞,该漏洞允许攻击者通过弱文件认证劫持更新流量并分发恶意软件。研究人员发现攻击针对东亚的电信和金融机构,并推测可能来自中国。新版本强制从GitHub下载更新以防止拦截,并改进了验证机制以增强安全性。 2025-12-12 22:16:28 Author: securityaffairs.com(查看原文) 阅读量:4 收藏

Notepad++ fixed updater bugs that allowed malicious update hijacking

Pierluigi Paganini December 12, 2025

Notepad++ addressed an updater vulnerability that allows attackers hijack update traffic due to weak file authentication.

Notepad++ addressed a flaw in its updater that allowed attackers to hijack update traffic due to improper authentication of update files in earlier versions.

The popular security researcher Kevin Beaumont first reported that several Notepad++ users faced security incidents. He later noted the attacks, targeting telecom and finance firms in East Asia, likely came from China. The expert also speculated that the attackers were exploiting a vulnerability in Notepad++.

“I’ve heard from 3 orgs now who’ve had security incidents on boxes with Notepad++ installed, where it appears Notepad++ processes have spawned the initial access. These have resulted in hands on keyboard threat actors.” wrote Beaumont.

In mid-November, Notepad++ released an update to harden its GUP/WinGUP updater after discovering it could be hijacked. GUP contacts a Notepad++ URL, retrieves gup.xml with the update download link, saves the file in %TEMP%, then executes it. If an attacker intercepts this traffic, previously HTTP, now HTTPS, but still interceptable at the ISP level, they can alter the <Location> field to deliver a malicious file.

Beaumont explained that although downloads are signed, older Notepad++ versions used a self-signed root certificate publicly available on GitHub, weakening validation. Because traffic to notepad-plus-plus.org is rare, ISP-level redirection is feasible for well-resourced actors.

Notepad++ 8.8.8 fixes the updater issue by forcing updates to download only from GitHub, making interception far harder.

“I’ve only talked to a small number of victims. They are orgs with interests in East Asia. Activity appears very targeted. Victims report hands on keyboard recon activity, with activity starting around two months ago.” continues Beaumont?

Signs of compromise include:

  • gup.exe contacting domains other than notepad-plus-plus.org, github.com, or release-assets.githubusercontent.com
  • gup.exe spawning unusual processes (it should only launch explorer.exe and legitimate, properly signed Notepad++ installers)
  • Suspicious files like update.exe or AutoUpdater.exe in %TEMP%
  • Use of curl.exe calling out to temp.sh for reconnaissance

However, is still unclear how attackers hijacked updater traffic in the wild. Beaumont speculates threat actors may have intercepted traffic at the ISP level to deliver malicious updates, though this would require substantial resources.

Notepad++ confirmed that its WinGUp updater was sometimes redirected to malicious servers, causing users to download compromised executables. The developers found a flaw in how the updater verified the authenticity and integrity of update files. If an attacker intercepted the traffic between the updater and Notepad++’s servers, they could force it to download and run a malicious binary instead of the legitimate update.

“The review of the reports led to identification of a weakness in the way the updater validates the integrity and authenticity of the downloaded update file.” reads the report published by the Notepad++. “In case an attacker is able to intercept the network traffic between the updater client and the Notepad++ update infrastructure, this weakness can be leveraged by an attacker to prompt the updater to download and executed an unwanted binary (instead of the legitimate Notepad++ update binary). To mitigate this weakness and address the hijacking’s concerns raised by the security researchers, a new security enhancement is being introduced in this release of Notepad++.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Notepad++)




文章来源: https://securityaffairs.com/185622/hacking/notepad-fixed-updater-bugs-that-allowed-malicious-update-hijacking.html
如有侵权请联系:admin#unsafe.sh