Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

Posted on February 2, 2026February 2, 2026 By CWS

Ravie LakshmananFeb 02, 2026Threat Intelligence / Malware
The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility’s replace mechanism to redirect replace visitors to malicious servers as a substitute.
“The assault concerned [an] infrastructure-level compromise that allowed malicious actors to intercept and redirect replace visitors destined for notepad-plus-plus.org,” developer Don Ho stated. “The compromise occurred on the internet hosting supplier degree fairly than by means of vulnerabilities in Notepad++ code itself.”
The precise mechanism by means of which this was realized is at the moment being investigated, Ho added.
The event comes slightly over a month after Notepad++ launched model 8.8.9 to handle a difficulty that resulted in visitors from WinGUp, the Notepad++ updater, being “often” redirected to malicious domains, ensuing within the obtain of poisoned executables.

Particularly, the issue stemmed from the way in which the updater verified the integrity and authenticity of the downloaded replace file, permitting an attacker who is ready to intercept community visitors between the updater consumer and the replace server to trick the software into downloading a distinct binary as a substitute.
It is believed this redirection was extremely focused, with visitors originating from solely sure customers routed to the rogue servers and fetching the malicious elements. The incident is assessed to have commenced in June 2025, greater than six months earlier than it got here to gentle.
Unbiased safety researcher Kevin Beaumont revealed that the flaw was being exploited by risk actors in China to hijack networks and deceive targets into downloading malware. In response to the safety incident, the Notepad++ web site has been migrated to a brand new internet hosting supplier.
“In response to the previous internet hosting supplier, the shared internet hosting server was compromised till September 2, 2025,” Ho defined. “Even after dropping server entry, attackers maintained credentials to inside providers till December 2, 2025, which allowed them to proceed redirecting Notepad++ replace visitors to malicious servers.”

The Hacker News Tags:Deliver, Hijacked, Malware, Mechanism, Notepad, Official, Select, Update, Users

Post navigation

Previous Post: Google Uncovered Significant Expansion in ShinyHunters Threat Activity with New Tactics
Next Post: Arsink Rat Attacking Android Devices to Exfiltrate Sensitive Data and Enable Remote Access

Related Posts

Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas The Hacker News
Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries The Hacker News
Interlock Ransomware Exploits Cisco Flaw for Root Access Interlock Ransomware Exploits Cisco Flaw for Root Access The Hacker News
67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers The Hacker News
SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported The Hacker News
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark