![]() |
|
Notepad++ hacked - Printable Version +- PowerBASIC Users Meeting Point (http://pump.richheimer.de) +-- Forum: Miscellaneous (http://pump.richheimer.de/forumdisplay.php?fid=11) +--- Forum: This and that - friendly chat (http://pump.richheimer.de/forumdisplay.php?fid=12) +--- Thread: Notepad++ hacked (/showthread.php?tid=116) |
Notepad++ hacked - Stanley Durham - 03.02.2026 Chinese Hackers Remote Executed Code Via Notepad++ for 6 Months _______________________________________________________ Please do not post any Youtube links (and others) without comment. Thank you Albert (PUMP admin) RE: Notepad++ hacked - Stanley Durham - 03.02.2026 I did a Google AI mode search, “Notepad++ hacked” Amongst the information was this. “Check for Indicators: Advanced users can check for a hidden directory named Bluetooth in the %AppData% folder, which was a known behavior of the malicious update script.” So, I asked how to do that. Method 3: Using Command Prompt (Most Accurate) This command lists all hidden directories in your AppData folder specifically. Press Win + S, type cmd, and press Enter. Copy and paste the following command, then hit Enter: Code: dir /a:h %AppData%Scan the list for a directory named Bluetooth. Fortunately, I didn’t have it. Remember, AI sometimes just makes things up. RE: Notepad++ hacked - Dale Yarker - 04.02.2026 Since we code, I thought some PB rather than Command Prompt is appropriate. Code: 'PBWin 9 / 10 or PBCC 5 / 6DIR$ a bit more complicated, and needs a file in the hidden folder to find the folder. edit - added kill for contained files. RMDIR needs directory empty to delete it.
RE: Notepad++ hacked - George Bleck - 05.02.2026 My team just finished handling this incident where I work. The Rapid7 report has great detail about IoCs. https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/ In a nutshell, it wasn't the CODE of Notepad++ that was compromised, it was the update infrastructure, managed by a hosting provider. Still a supply chain issue, but a subtle difference from something like the Solarwinds incident where actual application code was infected. Infections only happened when you used the update feature within Notepad++ during the period of compromise of the hosting provider. Don Hon (the programmer) has indicated that they have switched to another hosting provider and improved the security of the update process using signed resources. https://notepad-plus-plus.org/news/hijacked-incident-info-update/ RE: Notepad++ hacked - Stanley Durham - 05.02.2026 All way over my head, but there was more than one attack and more than one method used. - Chain #1: late July and early August 2025 - Chain #2: mid- and late September 2025 - Chain #3: October 2025 https://securelist.com/notepad-supply-chain-attack/118708/ |