Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Notepad++ Update System Breach Targets Global Users

Notepad++ Update System Breach Targets Global Users

Posted on February 4, 2026 By CWS

On February 2, 2026, developers of Notepad++ announced a significant security breach impacting the update infrastructure of the widely utilized text editor. The incident, a complex supply chain attack, remained undetected for several months, affecting users globally.

Details of the Cybersecurity Incident

The breach was facilitated through an incident at the hosting provider level, granting attackers unauthorized access from June to September 2025. This access allowed them to infiltrate internal systems until December 2025. The attack was marked by its operational sophistication, with perpetrators frequently changing command and control servers, downloaders, and final payloads from July to October 2025.

Impact and Analysis of the Attack

This breach targeted around a dozen individual machines in Vietnam, El Salvador, and Australia, alongside organizations in the Philippines and a Vietnamese IT service provider. Securelist analysts identified three distinct infection chains, each showcasing unique technical traits and evasion strategies.

The attackers employed various frameworks, including Metasploit downloaders and Cobalt Strike Beacon payloads, integrating the custom Chrysalis backdoor in later stages. Despite the diverse range of malicious payloads, Kaspersky’s security solutions managed to block the detected attacks.

Technical Insights into the Attack Methodology

The initial infection chain surfaced in late July 2025, involving a malicious NSIS installer distributed via the compromised update mechanism. When executed by the genuine Notepad++ updater, this installer sent system reconnaissance data to attacker-controlled servers through the temp.sh file hosting service.

Instead of the typical DLL sideloading, attackers leveraged an older vulnerability in ProShow software from the early 2010s, effectively bypassing modern detection systems. The exploit payload included two shellcodes, one as padding and the other decrypting a Metasploit downloader to fetch Cobalt Strike Beacon shellcode.

Security professionals can detect such threats by monitoring NSIS installer deployments and inspecting network traffic for unusual DNS resolutions to the temp.sh domain. Additionally, examining system logs for reconnaissance commands and implementing behavioral detection rules can fortify defenses against such supply chain attacks.

Stay updated with our latest news by following us on Google News, LinkedIn, and X, and set CSN as a preferred source in Google.

Cyber Security News Tags:Australia, Cybersecurity, El Salvador, IT security, Malware, Notepad, Philippines, security breach, supply chain attack, update infrastructure, Vietnam

Post navigation

Previous Post: Cyberwarfare Threats in 2026: Nation-State vs. Criminal Activities
Next Post: Orion Secures $32M to Enhance Data Security Solutions

Related Posts

VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited Cyber Security News
New Active Directory Lateral Movement Techniques that Bypasses Authentication and Exfiltrate Data New Active Directory Lateral Movement Techniques that Bypasses Authentication and Exfiltrate Data Cyber Security News
American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign Cyber Security News
DarkCloud Stealer Employs New Infection Chain and ConfuserEx-Based Obfuscation DarkCloud Stealer Employs New Infection Chain and ConfuserEx-Based Obfuscation Cyber Security News
Threat Actors Using Weaponized AV-themed Word and PDF Documents to Attack Israeli Organizations Threat Actors Using Weaponized AV-themed Word and PDF Documents to Attack Israeli Organizations Cyber Security News
Support for Windows 10 Ends Today Leaving Users Vulnerable to Cyberattacks Support for Windows 10 Ends Today Leaving Users Vulnerable to Cyberattacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Unveils Tool to Detect AI Model Backdoors
  • SystemBC Botnet Expands to 10,000 Devices for Global Attacks
  • ValleyRAT Malware Uses Fake LINE Installer to Steal Data
  • Critical SolarWinds Vulnerability Under Active Exploitation
  • MomentProof Introduces AI-Resilient Asset Protection for AXA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Unveils Tool to Detect AI Model Backdoors
  • SystemBC Botnet Expands to 10,000 Devices for Global Attacks
  • ValleyRAT Malware Uses Fake LINE Installer to Steal Data
  • Critical SolarWinds Vulnerability Under Active Exploitation
  • MomentProof Introduces AI-Resilient Asset Protection for AXA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark