- ■
Notepad++ update infrastructure hijacked for 6 months by Chinese state actors—from June through December 2025—before developers regained control
- ■
Attackers deployed Chrysalis, a 'custom, feature-rich backdoor' enabling direct hands-on keyboard access for targeted organizations with East Asia interests
- ■
The vulnerability: weak update verification in older versions allowed attackers at ISP level to intercept HTTPS traffic and redirect users to malicious servers
- ■
For developers: immediate upgrade to version 8.9.1+ required; for enterprises: implement network-level blocks on gup.exe process; for security teams: this signals mainstreaming of developer tool compromise tactics
Chinese state-backed hackers just moved the threat needle. For six months—June through December—they controlled the update infrastructure for Notepad++, the text editor trusted by millions of Windows developers worldwide. Rather than blast every user with malware, they played it surgical: selectively redirecting specific targets to backdoored versions containing a sophisticated payload called Chrysalis. This isn't just another breach. It's the moment when state actors shift their supply chain strategy from compromising individual targets to weaponizing the trusted mechanisms developers depend on daily. The timing matters—and matters differently—depending on who you are.
The attack surface we're tracking just shifted. Notepad++ sits on millions of developer machines as essentially invisible infrastructure—rarely updated, rarely questioned, deeply trusted. Chinese state-backed hackers exploited exactly that trust, hijacking the update delivery mechanism and using it as a precision scalpel rather than a sledgehammer.
Here's what the timeline reveals: The compromise began in June 2025 when attackers executed what Notepad++ described as an "infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic." For six months, they maintained control. They didn't spray malware everywhere. Instead, they selectively redirected certain targeted users—organizations with specific geographic interests in East Asia—to their own malicious servers where those users received backdoored versions. The attack remained undetected until late November when Notepad++ version 8.8.8 hardened the updater against exactly this type of hijacking. But here's the dangerous part: even after developers patched the weakness on September 2, the attackers maintained administrative credentials to the hosting infrastructure until December 2. They had a direct line in. They tried to re-exploit one weakness after it was fixed. The attempt failed only because the patch worked.
The payload they deployed—Chrysalis—tells you everything about sophistication and persistence. According to Rapid7's analysis, this wasn't a disposable tool. It's a permanent, feature-rich backdoor with broad capabilities designed to stay embedded. When independent researcher Kevin Beaumont started investigating the November patch, he found something chilling: three separate organizations reported that devices with Notepad++ became "hands on keyboard" incidents. Meaning actual humans—state actors—took direct remote control using web-based interfaces. All three organizations had East Asia interests.
This represents the inflection point security teams have been watching for. We've seen supply chain attacks before—SolarWinds, Codecov, the long chain of open-source compromises. But this one crystallizes a shift in attacker strategy. Why compromise millions of users when you can compromise the distribution mechanism and target thousands with surgical precision? Why broadcast your presence with mass malware when you can wait in the plumbing for specific traffic from specific geographies?
The vulnerability itself reveals how infrastructure gets outpaced by threat reality. Notepad++ uses a custom updater called GUP (or WinGUP) that retrieves version information and download URLs from notepad-plus-plus.org. The executable downloads files to the %TEMP% directory and executes them. Simple. Effective. Vulnerable. Earlier versions used unencrypted HTTP. Even newer versions relied on certificates that—while signed—didn't implement robust verification. Attackers sitting at ISP level could intercept HTTPS traffic and redirect the download URL to their own servers. This required significant resources, which is exactly why state actors executed it flawlessly.
This mirrors a pattern we're seeing accelerate: open-source infrastructure projects that the entire tech ecosystem depends on operate with funding that barely covers maintenance. Notepad++ has millions of users. Its security budget doesn't match that dependency by orders of magnitude. The six-month compromise could have been prevented—detected faster, exploited slower—with investment in logging, monitoring, and update verification that organizations with 1/100th of Notepad++'s user base take for granted.
The immediate response from Notepad++ has been clear: version 8.9.1 or higher, mandatory. Developers should be running this now. But for enterprises managing Notepad++ across thousands of machines, the decision tree is more complex. Kevin Beaumont recommended blocking the gup.exe process from internet access entirely, though he notes this is "very much overkill" for most organizations. The practical path: upgrade immediately, monitor for lateral movement, check endpoint logs for any process execution that might indicate prior compromise.
What makes this an inflection is the precedent it sets. Trusted developer tools are now demonstrably viable targets for state infrastructure operations. This wasn't a one-off. This was months of patient compromise waiting for specific traffic. Other open-source projects face the same vulnerability profile. Developers worldwide are now operating under a new threat model: your tools can become weapons against you, delivered through the exact update mechanisms designed to keep you secure.
For security teams, the window opened today. For enterprises, the decision point is now—before the next supply chain attack targets different infrastructure. For developers, the action is urgent: patch or migrate. The sophistication of Chrysalis and the patience of the actors behind it suggests this is exactly how state-sponsored operations will evolve. Not with dramatic zero-day sprees, but with quiet, persistent access through the infrastructure layers we've stopped questioning.
The Notepad++ compromise marks the moment when trusted developer infrastructure became primary target rather than secondary vector. For enterprise security teams, this resets the zero-trust equation—even official update mechanisms require verification. For developers, it means immediate patching to 8.9.1+ and monitoring for endpoint anomalies. For builders of open-source infrastructure, it's a loud signal that security funding doesn't scale with adoption. The next threshold to watch: whether other developer tools face similar scrutiny, and whether this incident accelerates enterprise migration toward either closed-source alternatives or tools with dedicated security teams. The timing window for detection closes fast—six months of undetected access means affected organizations are likely running Chrysalis right now.





