Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Notepad++ Update System Breach Targets Global Users

Notepad++ Update System Breach Targets Global Users

Posted on February 4, 2026 By CWS

On February 2, 2026, developers of Notepad++ announced a significant security breach impacting the update infrastructure of the widely utilized text editor. The incident, a complex supply chain attack, remained undetected for several months, affecting users globally.

Details of the Cybersecurity Incident

The breach was facilitated through an incident at the hosting provider level, granting attackers unauthorized access from June to September 2025. This access allowed them to infiltrate internal systems until December 2025. The attack was marked by its operational sophistication, with perpetrators frequently changing command and control servers, downloaders, and final payloads from July to October 2025.

Impact and Analysis of the Attack

This breach targeted around a dozen individual machines in Vietnam, El Salvador, and Australia, alongside organizations in the Philippines and a Vietnamese IT service provider. Securelist analysts identified three distinct infection chains, each showcasing unique technical traits and evasion strategies.

The attackers employed various frameworks, including Metasploit downloaders and Cobalt Strike Beacon payloads, integrating the custom Chrysalis backdoor in later stages. Despite the diverse range of malicious payloads, Kaspersky’s security solutions managed to block the detected attacks.

Technical Insights into the Attack Methodology

The initial infection chain surfaced in late July 2025, involving a malicious NSIS installer distributed via the compromised update mechanism. When executed by the genuine Notepad++ updater, this installer sent system reconnaissance data to attacker-controlled servers through the temp.sh file hosting service.

Instead of the typical DLL sideloading, attackers leveraged an older vulnerability in ProShow software from the early 2010s, effectively bypassing modern detection systems. The exploit payload included two shellcodes, one as padding and the other decrypting a Metasploit downloader to fetch Cobalt Strike Beacon shellcode.

Security professionals can detect such threats by monitoring NSIS installer deployments and inspecting network traffic for unusual DNS resolutions to the temp.sh domain. Additionally, examining system logs for reconnaissance commands and implementing behavioral detection rules can fortify defenses against such supply chain attacks.

Stay updated with our latest news by following us on Google News, LinkedIn, and X, and set CSN as a preferred source in Google.

Cyber Security News Tags:Australia, Cybersecurity, El Salvador, IT security, Malware, Notepad, Philippines, security breach, supply chain attack, update infrastructure, Vietnam

Post navigation

Previous Post: Cyberwarfare Threats in 2026: Nation-State vs. Criminal Activities
Next Post: Orion Secures $32M to Enhance Data Security Solutions

Related Posts

SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks SAP Security Update – Patch for Critical Vulnerabilities Allowing Code Execution and Injection Attacks Cyber Security News
ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates Cyber Security News
Dolby Digital Plus 0-Click Vulnerability Enables RCE Attack via Malicious Audio on Android Dolby Digital Plus 0-Click Vulnerability Enables RCE Attack via Malicious Audio on Android Cyber Security News
New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique New ‘Sryxen’ Stealer Bypasses Chrome Encryption via Headless Browser Technique Cyber Security News
Qilin Ransomware Using Ghost Bulletproof Hosting to Attack Organizations Worldwide Qilin Ransomware Using Ghost Bulletproof Hosting to Attack Organizations Worldwide Cyber Security News
Hackers Using ClickFix Technique to Attack Windows Machine and Execute Powershell Commands Hackers Using ClickFix Technique to Attack Windows Machine and Execute Powershell Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • MomentProof Introduces AI-Resilient Asset Protection for AXA
  • Orion Secures $32M to Enhance Data Security Solutions
  • Notepad++ Update System Breach Targets Global Users
  • Cyberwarfare Threats in 2026: Nation-State vs. Criminal Activities
  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • MomentProof Introduces AI-Resilient Asset Protection for AXA
  • Orion Secures $32M to Enhance Data Security Solutions
  • Notepad++ Update System Breach Targets Global Users
  • Cyberwarfare Threats in 2026: Nation-State vs. Criminal Activities
  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Southeast Asia

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark