<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Notepad++ — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/notepad++/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 21 Apr 2026 10:34:51 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/notepad++/feed.xml" rel="self" type="application/rss+xml"/><item><title>Notepad++ Updater (gup.exe) Creates Uncommon Files</title><link>https://feed.craftedsignal.io/briefs/2026-06-notepadpp-updater-file-creation/</link><pubDate>Tue, 21 Apr 2026 10:34:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-notepadpp-updater-file-creation/</guid><description>The Notepad++ updater (gup.exe) creating files in suspicious locations can indicate potential exploitation for malware delivery or unwarranted file placement, potentially leading to credential access and collection.</description><content:encoded><![CDATA[<p>The Notepad++ updater, <code>gup.exe</code>, is a component designed to automatically update the Notepad++ application. However, attackers can potentially exploit this updater to deliver malware or place unwarranted files on a system. This activity often begins with a compromised update server or a man-in-the-middle attack. Successful exploitation can lead to the installation of backdoors, credential access, and collection of sensitive information. The references provided highlight historical incidents involving the Notepad++ updater being abused in supply chain attacks. Defenders should monitor file creation events by <code>gup.exe</code> outside of expected program directories and temporary update locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user installs Notepad++ on their Windows system.</li>
<li>The <code>gup.exe</code> updater component, located within the Notepad++ installation directory, is executed to check for updates.</li>
<li>The updater connects to the Notepad++ update server to retrieve update information.</li>
<li>An attacker compromises the update server or performs a man-in-the-middle attack.</li>
<li>The compromised update server provides malicious instructions to <code>gup.exe</code>.</li>
<li><code>gup.exe</code> creates a malicious executable or script in an unexpected location, such as the user&rsquo;s temporary directory outside of normal update procedures.</li>
<li>The malicious file is executed, leading to further compromise such as installing a backdoor or stealing credentials.</li>
<li>The attacker gains initial access to the system and can perform collection and credential access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack exploiting the Notepad++ updater can lead to the installation of malware, such as backdoors, allowing attackers to gain persistent access to the compromised system. This can lead to data theft, credential compromise, and further lateral movement within the network. The number of potential victims depends on the scope of the compromised update server or the success of the man-in-the-middle attack. Historically, supply chain attacks targeting widely used software have impacted thousands of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Notepad++ Updater (gup.exe) Creates Uncommon Files&rdquo; to your SIEM and tune for your environment. This rule detects file creation events by <code>gup.exe</code> in suspicious locations (see rule configuration).</li>
<li>Monitor <code>file_event</code> logs for unusual file creation events initiated by <code>gup.exe</code> using the specified <code>logsource</code>.</li>
<li>Implement network monitoring to detect and prevent man-in-the-middle attacks against the Notepad++ update server.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>supply-chain</category><category>malware</category><category>notepad++</category></item></channel></rss>