Executive Summary
Between June and December 2025, Notepad++, a widely used text editor, was compromised through a sophisticated supply chain attack attributed to Chinese state-sponsored hackers. The attackers infiltrated the hosting provider's infrastructure, allowing them to intercept and redirect update traffic to malicious servers. This enabled the delivery of backdoored versions of Notepad++ to selected users, primarily targeting sectors such as government, telecommunications, and critical infrastructure. The breach was identified in early February 2026, prompting immediate security enhancements and advisories for users to update to version 8.9.1 or later.
This incident underscores the escalating threat of supply chain attacks, where adversaries exploit trusted software distribution channels to infiltrate target systems. Organizations are urged to reassess and fortify their software update mechanisms, implement stringent verification processes, and remain vigilant against such sophisticated attack vectors.
Why This Matters Now
The Notepad++ supply chain attack highlights the critical need for organizations to secure their software distribution channels against state-sponsored threats. With the increasing prevalence of such attacks, immediate action is required to implement robust verification processes and protect sensitive systems from potential compromises.
Attack Path Analysis
Attackers compromised Notepad++'s update infrastructure to deliver trojanized updates to selected users. They exploited insufficient update verification controls in older versions to gain initial access. After compromising the hosting provider's server, they maintained access through stolen credentials, allowing them to redirect update traffic to malicious servers. The attackers deployed a custom backdoor, Chrysalis, to establish command and control channels. This enabled them to exfiltrate sensitive data from targeted organizations. The impact included unauthorized access to confidential information and potential disruption of operations.
Kill Chain Progression
Initial Compromise
Description
Attackers exploited vulnerabilities in Notepad++'s update verification process to deliver trojanized updates to selected users.
Related CVEs
CVE-2025-15556
CVSS 7.7A vulnerability in Notepad++ versions prior to 8.8.9 allowed attackers to execute arbitrary code by exploiting insecure update integrity verification.
Affected Products:
Notepad++ Notepad++ – < 8.8.9
Exploit Status:
exploited in the wildCVE-2025-49144
CVSS 7.3A privilege escalation vulnerability in Notepad++ v8.8.1 installer allowed unprivileged users to gain SYSTEM-level privileges through insecure executable search paths.
Affected Products:
Notepad++ Notepad++ – 8.8.1
Exploit Status:
proof of concept
MITRE ATT&CK® Techniques
Compromise Software Supply Chain
Valid Accounts
Modify Authentication Process: Domain Controller Authentication
Application Layer Protocol: Web Protocols
Obfuscated Files or Information
Ingress Tool Transfer
Impair Defenses: Disable or Modify Tools
Indicator Removal: File Deletion
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Change Control Processes
Control ID: 6.4.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management Framework
Control ID: Article 6
CISA ZTMM 2.0 – Data
Control ID: Pillar 3
NIS2 Directive – Supply Chain Security
Control ID: Article 21
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Direct exposure to supply-chain attacks targeting development tools like Notepad++, requiring enhanced update verification controls and zero trust segmentation for development environments.
Information Technology/IT
Critical risk from compromised developer tools enabling lateral movement and exfiltration across client infrastructures, demanding comprehensive egress security and threat detection capabilities.
Financial Services
High-value target for Chinese APT groups using supply-chain vectors, requiring encrypted traffic monitoring and compliance with NIST frameworks for data protection.
Government Administration
Prime target for nation-state actors exploiting development tool compromises, necessitating enhanced visibility controls and secure hybrid connectivity for sensitive operations.
Sources
- Backdoor in Notepad++https://www.schneier.com/blog/archives/2026/02/backdoor-in-notepad.htmlVerified
- Notepad++ says Chinese government hackers hijacked its software updates for monthshttps://techcrunch.com/2026/02/02/notepad-says-chinese-government-hackers-hijacked-its-software-updates-for-months/Verified
- Notepad++ update server hijacked in targeted attacks - outfit claims Chinese state-sponsored hackers may be to blamehttps://www.tomshardware.com/tech-industry/cyber-security/notepad-update-server-hijacked-in-targeted-attacksVerified
- Notepad++ patches update chain after targeted compromisehttps://www.theregister.com/2026/02/02/notepad_plusplus_intrusion/Verified
- Notepad++ Vulnerability (CVE-2025-15556)https://www.yorku.ca/uit/2026/02/notepad-vulnerability-cve-2025-15556/Verified
- Notepad++ Breach: China-Linked Hackers Deploy Chrysalis Backdoorhttps://blogs.npav.net/blogs/post/notepad-breach-china-linked-hackers-deploy-chrysalis-backdoorVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's ability to move laterally and exfiltrate data by enforcing strict segmentation and identity-aware policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's ability to deliver malicious updates may have been constrained by enforcing strict identity-aware policies and workload isolation.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges may have been constrained by enforcing strict segmentation and identity-aware policies.
Control: East-West Traffic Security
Mitigation: The attacker's ability to move laterally within the network may have been constrained by enforcing strict east-west traffic controls.
Control: Multicloud Visibility & Control
Mitigation: The attacker's ability to establish command and control channels may have been constrained by enforcing strict multicloud visibility and control measures.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's ability to exfiltrate sensitive data may have been constrained by enforcing strict egress security and policy enforcement.
The overall impact of the attack may have been constrained by limiting unauthorized access and ensuring operational continuity.
Impact at a Glance
Affected Business Functions
- Software Development
- IT Operations
Estimated downtime: 7 days
Estimated loss: $500,000
Potential exposure of sensitive user data and intellectual property.
Recommended Actions
Key Takeaways & Next Steps
- • Implement robust update verification mechanisms, including certificate and signature validation, to prevent supply chain attacks.
- • Enforce Zero Trust Segmentation to limit lateral movement within internal networks.
- • Utilize East-West Traffic Security controls to monitor and restrict internal traffic flows.
- • Deploy Egress Security & Policy Enforcement to control outbound traffic and prevent unauthorized data exfiltration.
- • Establish comprehensive Threat Detection & Anomaly Response systems to identify and respond to malicious activities promptly.



