Technical Analysis & Remediation
Attack Vector & Mechanism
Infrastructure Hijack
Attackers gained access to the Notepad++ hosting provider (likely via compromised credentials) and modified the server responses for notepad-plus-plus[.]org.
Updater Exploitation
The WinGUp (gup[.]exe) component in older versions fetched an XML manifest (gup.xml) over HTTP or weakly validated HTTPS. Attackers injected a malicious <Location> tag pointing to their own servers.
Payload Delivery
The redirected updater downloaded a malicious binary (often named AutoUpdater[.]exe or update[.]exe) to the user's %TEMP% directory and executed it.
MITRE ATT&CK Mapping
T1195.002
(Supply Chain Compromise: Compromise Software Supply Chain)
T1105
(Ingress Tool Transfer)
T1071.001
(Application Layer Protocol: Web Protocols - Traffic Redirection)
T1204.002
(User Execution: Malicious File)
Evidence & Indicators of Compromise (IOCs)
Note
Hash values vary by target due to the selective nature of the attack.
File Artifacts
%TEMP%\AutoUpdater[.]exe
%TEMP%\update[.]exe
Process Behavior
gup[.]exe spawning curl[.]exe (bundled with Windows 10+) to contact external sites.
gup[.]exe spawning cmd[.]exe or powershell[.]exe (Legitimate updater should typically only spawn explorer[.]exe or the installer).
Network Artifacts
Traffic to temp.sh (Used for reconnaissance/staging).
gup.exe making requests to domains other than:
notepad-plus-plus[.]org
github[.]com
release-assets.githubusercontent[.]com
Remediation - THE ENTERPRISE TRACK (SANS PICERL)
Phase 1: Identification & Containment
Network Block
Immediately block outbound traffic from gup.exe at the firewall/EDR level.
Hunt Query (EDR/SIEM)
Search for gup[.]exe process trees.
Logic
ParentProcessName == 'notepad++[.]exe' AND ProcessName == 'gup[.]exe' AND ChildProcessName != 'explorer[.]exe' (Flag curl[.]exe, cmd[.]exe, powershell[.]exe).
Vulnerability Scan
Identify all endpoints running Notepad++ versions < 8.8.9.
Phase 2: Eradication
Update Enforcement
Deploy Notepad++ v8.8.9 (or v8.9.2 if available) immediately. These versions enforce strict GPG signature verification of the update manifest and binary.
Purge Artifacts
Delete any AutoUpdater.exe or update.exe found in %TEMP% or %AppData%\Local\Temp created by the gup process.
Phase 3: Recovery
Validation
Verify the new installation's integrity by checking the digital signature on notepad++[.]exe and gup.exe.
Policy Update
Consider disabling the "Auto-Update" feature via GPO/Configuration for high-value assets and managing updates via a centralized SCCM/Intune pipeline.
Phase 4: Lessons Learned
Supply Chain Visibility
Review third-party software update mechanisms. Applications using non-standard updaters (like WinGUp) often lack the rigorous security controls of OS-level updaters.
Remediation - THE HOME USER TRACK
Priority 1: Safety
Stop the Updater
Do not use the "Plugins Admin" or built-in "Update Notepad++" feature until you have manually installed the latest version.
Manual Update
Download the latest installer directly from the official notepad-plus-plus.org website or their official GitHub release page.
Priority 2: Persistence Removal
Check Temp Folders
Press Win + R, type %TEMP%, and hit Enter. Look for suspicious .exe files created around the time you last updated Notepad++. Delete them.
Scan
Run a full offline scan with Microsoft Defender or a reputable second-opinion scanner (e.g., Malwarebytes).
Hardening & References
Tactical Hardening
If you are in a high-risk environment, disable the auto-updater by renaming or deleting gup.exe in the Notepad++ installation directory (usually C:\Program Files\Notepad++\updater).
References
Kevin Beaumont (DoublePulsar) Report
Heise Online Article
Notepad++ v8.8.9 Release Announcement
Incident Report: Hijacked Incident Info Update
Official Download Site