· Cybersecurity · 2 min read
Notepad Update Mechanism Hijacked for Malware
The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility’s update mechanism to redirect update traffic to malicious servers instead.
“The attack involved [an] infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org,” developer Don Ho said. “The compromise occurred at the hosting provider level rather than through vulnerabilities in Notepad++ code itself.”
The exact mechanism through which this was realized is currently being investigated, Ho added.
A Targeted Supply Chain Attack
This development comes a little over a month after Notepad++ released version 8.8.9 to address an issue where traffic from WinGUp, the Notepad++ updater, was being “occasionally” redirected to malicious domains. These redirections resulted in the download of poisoned executables.
Now, here’s the thing: the problem stemmed specifically from the way the updater verified the integrity and authenticity of the downloaded update file. This allowed an attacker capable of intercepting network traffic between the updater client and the update server to trick the tool into downloading a different binary instead.
It is believed this redirection was highly targeted. Traffic originating from only certain users was routed to the rogue servers to fetch malicious components, while other users received legitimate updates.
Timeline of the Breach
The incident is assessed to have commenced in June 2025, more than six months before it fully came to light.
Independent security researcher Kevin Beaumont revealed that the flaw was being exploited by threat actors in China to hijack networks and deceive targets into downloading malware. In response to the security incident, the Notepad++ website has since been migrated to a new hosting provider to prevent further tampering.
“According to the former hosting provider, the shared hosting server was compromised until September 2, 2025,” Ho explained. “Even after losing server access, attackers maintained credentials to internal services until December 2, 2025, which allowed them to continue redirecting Notepad++ update traffic to malicious servers.”
Protecting the Distribution Chain
The migration to a new provider marks a significant step in securing the popular text editor’s distribution chain. However, the fact that attackers held onto internal credentials for months after the initial server breach highlights the persistence of modern state-sponsored threats.
Users are encouraged to ensure they are running the latest version of Notepad++ and to verify the digital signatures of their installations to ensure they haven’t been caught in the crosshairs of this targeted campaign.
Share this post
News Feed
Get the Hottest Cybersecurity News Delivered to You!
Thank you!
You have successfully joined our subscriber list.





