Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
New cPanel & WHM Flaws Allow Code Execution Enable Attacks
May 10, 2026
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Home/CyberSecurity News/State-Sponsored Actors Hijack Notepad++ Update for
CyberSecurity News

State-Sponsored Actors Hijack Notepad++ Update for

A likely Chinese state-sponsored threat actor compromised Notepad++’s former shared hosting infrastructure between June and December 2025 in a targeted attack, the project’s developer has...

Sarah simpson
Sarah simpson
February 2, 2026 2 Min Read
2 0

A likely Chinese state-sponsored threat actor compromised Notepad++’s former shared hosting infrastructure between June and December 2025 in a targeted attack, the project’s developer has confirmed.

The breach allowed attackers to intercept and selectively redirect update traffic to malicious servers, exploiting a weakness in how the software validated update packages before the release of version 8.8.9.

Infrastructure-Level Hijacking

According to the forensic analysis conducted by independent security experts and the former hosting provider, the compromise occurred at the infrastructure level rather than through a vulnerability in the Notepad++ codebase itself. The attackers gained access to the shared hosting server, allowing them to intercept requests destined for notepad-plus-plus.org.

The attack specifically targeted the getDownloadUrl.php script used by the application’s updater. By controlling this endpoint, the threat actors could selectively redirect specific users to attacker-controlled servers hosting malicious binaries.

These malicious payloads were served instead of the legitimate update, leveraging the fact that older versions of the updater (WinGUp) did not strictly enforce certificate and signature validation for downloaded installers.

Multiple independent security researchers have assessed that the campaign was likely conducted by a Chinese state-sponsored group. The targeting was described as “highly selective,” focusing on specific users rather than a broad supply-chain infection.

The compromise spanned approximately six months, with the hosting provider identifying two distinct phases of unauthorized access:

Date Event Description
June 2025 Initial Compromise: Attackers gain access to the shared hosting server.
September 2, 2025 Server Access Lost: A scheduled maintenance update (kernel/firmware) by the provider severed the attackers’ direct server access.
Sept 2 – Dec 2, 2025 Credential Persistence: Attackers maintained access via stolen internal service credentials, allowing continued traffic redirection despite losing server control.
November 10, 2025 Attack Ceased (Estimate): Security experts note the active attack campaign appeared to halt around this date.
December 2, 2025 Access Terminated: Hosting provider rotated all credentials and completed security hardening, definitively blocking the attackers.
December 9, 2025 Mitigation Released: Notepad++ v8.8.9 released with hardened update verification.

The hosting provider confirmed that no other clients on the shared server were targeted; the attackers specifically hunted for the Notepad++ domain. In response to the incident, the Notepad++ website has been migrated to a new provider with enhanced security protocols.

To prevent similar hijacking attempts, Notepad++ version 8.8.9 introduced strict validation within WinGUp, requiring both a valid digital signature and a matching certificate for any downloaded installer. If these verifications fail, the update process is now automatically aborted.

Looking ahead, the project is implementing the XMLDSig (XML Digital Signature) standard for update manifests. This reinforcement will ensure that the XML data returned by the update server is cryptographically signed, preventing tampering with the download URLs. This feature is scheduled for enforcement in version 8.9.2, expected to be released within the next month.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachExploitSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Critical Johnson Controls Flaws Enable Remote SQL Injection

Next Post

1-Click Clawdbot Flaw Allows Mal Vulnerability Enable

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Deploy Modular RAT for Credential Theft With Screenshot
May 8, 2026
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us