• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Notepad++ Plugins Allow Attackers to Infiltrate Systems, Achieve Persistence

You are here: Home / General Cyber Security News / Notepad++ Plugins Allow Attackers to Infiltrate Systems, Achieve Persistence
September 15, 2022

Risk actors could abuse Notepad++ plugins to circumvent security mechanisms and obtain persistence on their sufferer device, new analysis from security corporation Cybereason indicates.

“Using an open–source venture, Notepad++ Plugin Pack, a security researcher that goes by the identify RastaMouse was in a position to demonstrate how to construct a destructive plugin that can be made use of as a persistence mechanism,” the organization wrote in an advisory on Wednesday.

The plugin pack by itself is just a .NET bundle for Visual Studio that supplies a basic template for developing plugins. Nevertheless, innovative persistent danger (APT) groups have leveraged Notepad++ plugins for nefarious needs in the past.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“The APT team StrongPity is identified to leverage a legitimate Notepad++ installer accompanied with destructive executables, permitting it to persist soon after a reboot on a equipment,” the Cybereason advisory reads.

“This backdoor permits this menace actor to put in a keylogger on the equipment and converse with a C2 server to mail the output of this application.”

In their advisory, the Cybereason team analyzed the Notepad++ plugin loading mechanism and drafted an attack situation based mostly on this vector.

Making use of the C# programming language, the security gurus made a dynamic connection library (DLL) managing a PowerShell command on the first initial push of any crucial inside Notepad++. 

“In our attack circumstance, the PowerShell command will execute a Meterpreter payload,” the enterprise wrote.

Cybereason then ran Notepad++ as ‘administrator’ and re–ran the payload, properly taking care of to reach administrative privileges on the afflicted technique.

To mitigate this menace, the security experts said companies should keep an eye on strange child processes of Notepad++ and pay out particular notice to shell item varieties.

For far more details about the attack state of affairs, the original Cybereason advisory is obtainable at this link.

Additional frequently, plugins are typically exploited as attack vectors by destructive actors. For instance, last week, Wordfence noted a zero–day flaw in a WordPress plugin called BackupBuddy with 5 million installations.


Some sections of this write-up are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News YouTube Users Targeted By RedLine Self-Spreading Stealer
Next Post: Webworm Attackers Deploy Modified RATs in Espionage Attacks Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

Copyright © TheCyberSecurity.News, All Rights Reserved.