Lemmy Mengsk
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
Beep@lemmus.org to Technology@lemmy.worldEnglish · 2 days ago

Notepad++ Hijacked by State-Sponsored Hackers

notepad-plus-plus.org

external-link
message-square
91
link
fedilink
  • cross-posted to:
  • opensource@lemmy.ml
  • technology@lemmy.ml
526
external-link

Notepad++ Hijacked by State-Sponsored Hackers

notepad-plus-plus.org

Beep@lemmus.org to Technology@lemmy.worldEnglish · 2 days ago
message-square
91
link
fedilink
  • cross-posted to:
  • opensource@lemmy.ml
  • technology@lemmy.ml
Notepad++ Hijacked by State-Sponsored Hackers | Notepad++
notepad-plus-plus.org
external-link
  • pez@piefed.blahaj.zone
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 day ago

    Fair point. I was assuming the malicious payload would come along with an update on order to hide, but it’s also possible that the malicious payload was delivered without any update to notepad++.

    I’ve not seen any IOCs published have you?

    • floofloof@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 hours ago

      There’s some IOC information here:

      https://securelist.com/notepad-supply-chain-attack/118708/

      And here:

      https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/

      • pez@piefed.blahaj.zone
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 hours ago

        Thanks!

    • AceBonobo@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      13 hours ago

      I’m not sure what you mean. The article states there were remote hands on keyboard noticed in multiple companies. That’s how the vulnerability was discovered.

      • pez@piefed.blahaj.zone
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        6 hours ago

        I mean IOCs that you can scan for in an environment to see if a machine has been compromised using this vulnerability. Something that tells you if you need to do additional remediation on a machine or just update notepad++ and move on.

        Edit: Found some! This is the type of info I was thinking of when I used IOCs

        https://securelist.com/notepad-supply-chain-attack/118708/

Technology@lemmy.world

technology@lemmy.world

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !technology@lemmy.world

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


  • @L4s@lemmy.world
  • @autotldr@lemmings.world
  • @PipedLinkBot@feddit.rocks
  • @wikibot@lemmy.world
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 3.64K users / day
  • 11.4K users / week
  • 11.5K users / month
  • 26.9K users / 6 months
  • 1 local subscriber
  • 80.3K subscribers
  • 14.5K Posts
  • 550K Comments
  • Modlog
  • mods:
  • L3s@lemmy.world
  • enu@lemmy.world
  • Technopagan@lemmy.world
  • L4sBot@lemmy.world
  • L3s@hackingne.ws
  • BE: 0.19.13
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org