Understanding the present, shaping the future.

Search
02:45 PM UTC · SATURDAY, MAY 2, 2026 LA ERA · Chile
May 2, 2026 · Updated 02:45 PM UTC
Cybersecurity

Notepad++ Server Hijacking Exposed: Update Mechanism Compromised for Six Months

The developer of the popular text editor Notepad++, Don Ho, confirmed that the application's update servers were compromised between June and December 2025. Ho suggested the attack was likely orchestrated by a Chinese state-sponsored group targeting specific users. The vulnerability allowed attackers to potentially redirect users to malicious update manifests, granting remote access.

Isabel Moreno

2 min read

Notepad++ Server Hijacking Exposed: Update Mechanism Compromised for Six Months
Notepad++ Server Hijacking Exposed: Update Mechanism Compromised for Six Months

Users of the widely utilized Notepad++ code and text editor may have unknowingly installed malicious software after its update servers were hijacked for approximately six months last year. Developer Don Ho announced details of the compromise, stating the attackers were "likely a Chinese state-sponsored group" and that the vulnerability persisted from June through December 2nd, 2025, according to a report by The Verge.

The attack exploited the application’s unnamed hosting provider, selectively redirecting traffic from targeted users to attacker-controlled servers. These compromised servers delivered malicious update manifests, which could replace the legitimate app update with a harmful executable file. Cybersecurity expert Kevin Beaumont indicated this malware may have provided hackers with remote access to a victim's keyboard.

Ho’s statement specified that the targeting was highly selective, suggesting the threat actors were not broadcasting the attack widely. Beaumont noted that the affected individuals he consulted were organizations with specific interests related to East Asia. This focus implies a espionage objective rather than a generalized malware distribution campaign.

All unauthorized access to the update mechanism was reportedly terminated by December second, though the exact date the developer discovered the breach remains unspecified. To mitigate the risk, the Notepad++ updater has since been reinforced with stronger security protocols to verify update legitimacy and check for tampering.

Users are strongly advised to update to at least version 8.8.9, which specifically addressed the vulnerabilities introduced by the hijacking incident. Ho recommended downloading this version directly from the official Notepad++ website to ensure integrity, rather than relying on automated checks alone.

Beaumont also provided supplementary security guidance, urging users to verify they are not running unofficial builds of the application. Furthermore, users should monitor activity related to the updater process, specifically "gup.exe," and check their system's TEMP folder for suspicious "update.exe" or "AutoUpdater.exe" files.

This incident follows past geopolitical tension involving the software; Ho had previously released a "Free Uyghur" edition in 2019, attracting noted DDoS attacks against his website at that time, as reported by The Verge.

Comments