State-sponsored hackers hijacked Notepad++'s update infrastructure through a hosting provider compromise, selectively redirecting users to malicious servers between June and December 2025 before security controls were strengthened.
The maintainers of Notepad++ have disclosed a sophisticated supply chain attack that compromised the text editor's update mechanism for nearly six months. According to security findings published in the v8.8.9 release notes, attackers gained infrastructure-level access through a shared hosting provider, enabling them to intercept and redirect update traffic for targeted users.
Attack Timeline & Methodology
- Infiltration Period: June 2025 - December 2025
- Initial Compromise: Attackers breached the shared hosting server housing notepad-plus-plus.org
- Traffic Redirection: Malicious actors selectively intercepted requests to
/update/getDownloadUrl.php - Persistence Mechanism: Maintained access to internal service credentials even after losing server control
Forensic analysis revealed the attackers exploited insufficient update verification controls in older Notepad++ versions. The hosting provider's investigation showed:
- Full server compromise until September 2, 2025
- Credential-based access to update redirection systems until December 2, 2025
- Highly targeted activity focused exclusively on Notepad++ infrastructure
Mitigation Measures Implemented
- Hosting Migration: Notepad++ services moved to a new provider with enhanced security protocols
- Update Verification: v8.8.9 introduced certificate and installer signature validation
- XML Signing: Update manifests now use XMLDSig digital signatures
- Mandatory Enforcement: Upcoming v8.9.2 will require strict signature verification
Multiple independent security researchers attribute the attack to a Chinese state-sponsored group based on the operation's sophistication, persistence mechanisms, and selective targeting patterns. The attackers appeared particularly interested in exploiting Notepad++'s widespread use among developers and system administrators.
User Protection Recommendations
- Immediately upgrade to Notepad++ v8.8.9 or later
- Verify installer signatures through Windows' right-click properties dialog
- Monitor for unexpected update prompts outside normal release cycles
The Notepad++ maintainer acknowledged the severity of the breach, stating: "I deeply apologize to all users affected by this hijacking. We've implemented multiple layers of verification to prevent recurrence, but supply chain security remains an ongoing challenge for all open-source projects."
This incident highlights the growing risk of software distribution infrastructure compromises, particularly for widely-used developer tools. The attackers' ability to maintain persistence through credential access after losing server control demonstrates advanced operational security techniques characteristic of nation-state actors.
Comments
Please log in or register to join the discussion