Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Chinese Hackers Hijack Notepad++ Updates for 6 Months
    Cybersecurity

    Chinese Hackers Hijack Notepad++ Updates for 6 Months

    adminBy adminFebruary 3, 2026No Comments6 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Chinese Hackers Hijack Notepad++ Updates for 6 Months
    Share
    Facebook Twitter LinkedIn Pinterest Email

    A likely China-sponsored threat actor hijacked Notepad++’s software update mechanism and quietly redirected targeted users of the popular source code editor to malicious downloads for nearly six months.

    The breach, which lasted between between June and December of 2025, stemmed from an infrastructure-level compromise at Notepad++’s hosting provider that allowed the attackers to intercept update traffic destined for the legitimate notepad-plus-plus.org domain and redirect it to attacker-controlled servers that delivered malicious payloads. The compromise of Notepad++’s updates is the latest example of supply chain attacks targeting the software ecosystem, which have increased in recent years. 

    Compromised Hosting Provider Leads to Hijacked Updates

    “The exact technical mechanism remains under investigation, though the compromise occurred at the hosting provider level rather than through vulnerabilities in Notepad++ code itself,” Dan Ho, the main maintainer of Notepad++, said in a blog post on Monday. “Traffic from certain targeted users was selectively redirected to attacker-controlled served malicious update manifests.”

    Related:OpenClaw AI Runs Wild in Business Environments

    Notepad++ is an open source text and source-code editor widely used by developers and programmers. Any compromise of its update mechanism is particularly dangerous because it could allow an attacker to inject malware directly into an organization’s development environment. 

    The software has been downloaded tens of millions of times since it was first released in 2003 and remains popular among developers, system administrators, and IT professionals. Industry trackers estimate that thousands of organizations — including many large enterprises — use Notepad++ as part of their development workflows. Its continued popularity within the developer community is almost certainly what made it a high-value target for the perpetrators of the attack on Notepad++’s hosting provider.

    “Once the updater was hijacked, the threat actor became a part of the trusted execution path for updates,” says Morey Haber, chief security advisor at BeyondTrust. That would have given them the opportunity to drop compromised updates with the same privileges as legitimate software installations and made them capable of bypassing local controls. 

    “That means reconnaissance, credential harvesting, lateral movement, persistence, or even data exfiltration became feasible inside the target networks based on Notepad++ usage,” Haber says. By manipulating the update mechanism and redirecting traffic to malicious servers, the threat actors bypassed conventional defenses like endpoint security controls and content filters, he notes.

    Related:Trump Administration Rescinds Biden-Era Software Guidance

    Notepad++ Compromise Linked to Chinese APT

    According to Ho, an investigation of the breach showed that an unamed Chinese state-sponsored group gained access to the third-party server hosting Notepad++’s WinGUp updater, sometime in June 2025. Between June and September, the attacker quietly and very selectively redirected traffic from WinGUp to an attacker-controlled server that downloaded malicious executables. The attacker lost their foothold on the third-party hosting provider’s server on Sept. 2, following scheduled maintenance where the server firmware and kernel were updated.

    However, even after losing direct access, the attackers still had valid credentials in their possession which they used to continue redirecting Notepad++ update traffic to their malicious servers until at least Dec. 2., Ho said. “The attackers specifically targeted Notepad++ domain with the goal of exploiting insufficient update verification controls that existed in older versions of Notepad++,” he noted.

    Following the breach, the Notepad++ project has moved its website to a new hosting provider that offers stronger security protections, Ho said. At the software level, the Notepad++ project has released a new version of WinGUp that now checks whether an update downloads successfully and also whether it is genuinely signed by Notepad++ and delivered using a valid security certificate.

    Related:Months After Patch, WinRAR Bug Poised to Hit SMBs Hardest

    In addition, the update server now digitally signs the update instructions it sends to the client, making it harder for an attacker to alter them in transit. Starting with version 8.9.2, Notepad++ will strictly enforce these checks, meaning the updater will refuse to install anything that fails verification, he said.

    Security researcher Kevin Beaumont, who first reported on a handful of compromises involving Notepad++, has attributed the attack to Violet Typhoon, a China-based advanced persistent threat (APT) actor that some track as APT31 and Zirconium. According to Beaumont, the targets of the threat group’s attack via Notepad++’s updater included financial services companies and telecom providers of strategic interest to China.

    Rapid7, meanwhile, attributed the supply chain attack to a different China-linked APT called Lotus Blossom. In a blog post on Monday, Rapid7 malware analyst Ivan Feigl described how the threat group deployed a previously undocumented custom backdoor, dubbed “Chrysalis,” via the supply chain attack.

    Supply Chain Threats Continue

    Even with greater enterprise focus on protecting development environments and software supply chains, threat actors still are finding ways to tamper with applications and updates. “APT31 bypassed every build-pipeline defense the industry deployed after SolarWinds by compromising the hosting provider and selectively poisoning Notepad++ updates to East Asian telecom and financial targets for six months,” says Collin Hogue-Spears, senior director of solution management at Black Duck. The threat actor didn’t touch Notepad++ source code, didn’t compromise the build pipeline, and never broke a single signature. 

    “They lived inside the hosting provider for six months, filtered update requests by IP range, and hand-delivered Trojanized installers to East Asian telecom and financial targets while millions of other users pulled clean copies.,” Hogue-Spears says. “The software supply chain has shifted from a development pipeline to a liability pipeline, and this attack exploited the gap most organizations still don’t instrument: the path between a vendor-signed binary and your endpoint.”

    The lesson for organizations from such supply chain attacks is stop treating updates as trusted just because it comes from a legitimate domain. Auto-updaters, Hogue-Spears reminds, are remote code execution pipelines. “Kill direct-to-Internet updates for developer tools; force them through an internal repository that re-validates the vendor’s code-signing certificate and blocks anything not signed by the expected publisher,” he says.

    Haber points to other measures organizations can take to reduce exposure to compromise via the software update infrastructure. These include enforcing strict cryptographic verification of updates, including signed manifests and checksums for binaries; ensuring that updates behave as intended; vetting the security practices of hosting and content distributors; and performing regular threat hunting around trusted processes and paths. 

    “Supply chains are now high-stakes attack vectors,” Haber notes, “and insecure infrastructure, regardless of its function, is another potential attack vector.”

    Chinese hackers Hijack months Notepad Updates
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle Ads API update cracks open Performance Max by channel
    Next Article My Favorite Beats Headphones Are More Than Half Off
    admin
    • Website

    Related Posts

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026

    Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

    March 5, 2026

    Fideo Intelligence enhances dark web monitoring capabilities to reduce payment fraud

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026

    What SMEC’s Data Reveals About AI Max Performance

    March 5, 2026

    This Ultra phone first to use Sony’s new 200MP camera sensor

    March 5, 2026

    Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (622)
    • Privacy & Online Earning (92)
    • SEO & Digital Marketing (395)
    • Tech Tools & Mobile / Apps (759)
    • WiFi / Internet & Networking (111)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical

    March 5, 2026

    What SMEC’s Data Reveals About AI Max Performance

    March 5, 2026

    This Ultra phone first to use Sony’s new 200MP camera sensor

    March 5, 2026
    Most Popular
    • Cisco Drops 48 New Firewall Vulnerabilities, 2 Critical
    • What SMEC’s Data Reveals About AI Max Performance
    • This Ultra phone first to use Sony’s new 200MP camera sensor
    • Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
    • Yep, Amazon Is Down | Lifehacker
    • Fideo Intelligence enhances dark web monitoring capabilities to reduce payment fraud
    • AI Max increases revenue 13% but drives higher CPA: Study
    • Why everyone should use VS Code (even if they aren’t programmers)
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.