Notepad++ update mechanism compromised at hosting provider level, redirecting select users to malicious servers for over six months before discovery.
The popular text editor Notepad++ has fallen victim to a sophisticated supply chain attack that compromised its official update mechanism for over six months, according to developer Don Ho. The attack, attributed to state-sponsored actors, involved an infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org.
The Attack Vector
The compromise occurred at the hosting provider level rather than through vulnerabilities in Notepad++ code itself, making it particularly difficult to detect. The attackers maintained access to internal services until December 2, 2025, even after losing direct server access in early September 2025. This persistence allowed them to continue redirecting Notepad++ update traffic to malicious servers for an extended period.
Security researcher Kevin Beaumont revealed that the flaw was being exploited by threat actors in China to hijack networks and deceive targets into downloading malware. The attack specifically targeted WinGUp, the Notepad++ updater, which failed to properly verify the integrity and authenticity of downloaded update files.
Technical Details of the Compromise
The vulnerability stemmed from how the updater verified downloaded files. An attacker who could intercept network traffic between the updater client and the update server could trick the tool into downloading a different binary instead of the legitimate update. This man-in-the-middle attack allowed the injection of poisoned executables into the update stream.
What makes this attack particularly concerning is its selective nature. Traffic originating from only certain users was routed to the rogue servers, suggesting a highly targeted operation rather than a broad-based attack. This selective targeting likely helped the attackers avoid detection for an extended period.
Timeline and Impact
The incident is assessed to have commenced in June 2025, more than six months before it came to light. This lengthy undetected period highlights the challenges in identifying supply chain compromises, especially when they occur at the infrastructure level rather than in the application code itself.
In response to the security incident, the Notepad++ website has been migrated to a new hosting provider. The former hosting provider confirmed that the shared hosting server was compromised until September 2, 2025, but attackers maintained credentials to internal services until December 2, 2025.
Previous Security Issues
This incident follows a similar security issue addressed in version 8.8.9 released in December 2024. That update resolved a problem where traffic from WinGUp was "occasionally" redirected to malicious domains, resulting in the download of poisoned executables. The recurrence of such issues highlights the ongoing challenges in securing software update mechanisms.
Security Implications
This attack demonstrates the critical importance of securing the entire software supply chain, not just the application code. Infrastructure-level compromises can be particularly dangerous because they bypass traditional code security measures and can affect all users of a software product.
The selective targeting aspect of this attack suggests sophisticated threat actors conducting espionage or targeted compromise operations. By only redirecting certain users to malicious servers, the attackers could maintain operational security while still achieving their objectives against specific targets.
Mitigation and Prevention
For users of Notepad++, the immediate mitigation is to ensure they are running the latest version of the software, which includes fixes for the update verification process. However, this incident serves as a broader reminder for all software users and developers about the importance of:
- Verifying software integrity through multiple channels
- Monitoring network traffic for unusual patterns
- Implementing robust update verification mechanisms
- Regularly auditing infrastructure security
- Using multiple hosting providers or redundant update systems
The Broader Context
This attack is part of a growing trend of supply chain compromises targeting widely-used software tools. Similar incidents have affected other popular development tools and utilities, highlighting the attractive target that software update mechanisms represent for sophisticated threat actors.
The fact that this attack was attributed to state-sponsored actors underscores the high stakes involved in software supply chain security. Nation-state actors have the resources and motivation to conduct long-term, sophisticated attacks that can compromise entire ecosystems of users and organizations.
Moving Forward
As software development and distribution become increasingly complex, the attack surface for supply chain compromises continues to expand. This incident serves as a wake-up call for the entire software industry to prioritize infrastructure security and implement more robust verification mechanisms for software updates.
For Notepad++ users, the incident highlights the importance of staying current with security updates and being vigilant about unexpected software behavior. For the broader software development community, it reinforces the need for defense-in-depth approaches that protect not just the code, but the entire infrastructure supporting software distribution.
The Notepad++ incident demonstrates that even well-maintained, open-source software projects can fall victim to sophisticated infrastructure-level attacks. As threat actors continue to evolve their tactics, the software industry must remain vigilant and proactive in securing every aspect of the software supply chain.

Comments
Please log in or register to join the discussion