Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Notepad++ Patches Updater Flaw After Reports of Traffic Hijacking

Posted on December 12, 2025December 12, 2025 By CWS

Latest Notepad++ releases deal with a vulnerability that has allowed risk actors to hijack the free supply code editor’s updater. 

Safety researcher Kevin Beaumont reported in early December {that a} handful of organizations utilizing Notepad++ had reported experiencing safety incidents involving the code editor.

Beaumont mentioned in an replace this week that the assaults appeared to have been carried out by risk actors in China, with the attackers leveraging a Notepad++ vulnerability for preliminary entry to the programs of telecoms and monetary providers companies in East Asia.

Notepad++ builders appear to have identified about points with the updater since no less than mid-November, when model 8.8.8 launch notes talked about a safety enhancement designed to stop the appliance’s updater from being hijacked.

In a put up revealed this week to announce the discharge of model 8.8.9, Notepad++ confirmed that visitors from the updater (WinGUp) was in some circumstances redirected to malicious servers, which resulted in compromised executable recordsdata being downloaded to the sufferer’s system.

Notepad++ builders’ investigation led to the invention of a flaw in the way in which the updater validates the authenticity and integrity of replace recordsdata.

“In case an attacker is ready to intercept the community visitors between the updater shopper and the Notepad++ replace infrastructure, this weak point could be leveraged by an attacker to immediate the updater to obtain and executed an undesirable binary (as a substitute of the respectable Notepad++ replace binary).”

Within the newest model, Notepad++ and the WinGUp element confirm the signature of downloaded installers throughout the replace course of, and the replace shouldn’t be carried out if the verify fails.

Nevertheless, it has but to be decided precisely how visitors has been hijacked within the wild.Commercial. Scroll to proceed studying.

Beaumont, who described the marketing campaign as a provide chain assault, believes risk actors could also be hijacking visitors on the ISP degree to push malicious updates, however identified that vital sources are required to conduct such an assault.

Associated: Google Patches Mysterious Chrome Zero-Day Exploited within the Wild

Associated: Huge Vary of Malware Delivered in React2Shell Assaults

Associated: Unpatched Gogs Zero-Day Exploited for Months

Security Week News Tags:Flaw, Hijacking, Notepad, Patches, Reports, Traffic, Updater

Post navigation

Previous Post: New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA
Next Post: Microsoft Bug Bounty Program Expanded to Third-Party Code

Related Posts

Exploited CrushFTP Zero-Day Provides Admin Access to Servers Security Week News
Zafran Security Raises $60 Million in Series C Funding Security Week News
Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks Security Week News
Dataminr to Acquire ThreatConnect for $290 Million Security Week News
Cisco ISE, CitrixBleed 2 Vulnerabilities Exploited as Zero-Days: Amazon Security Week News
Widespread Infostealer Campaign Targeting macOS Users Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
  • LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS
  • From Open Source to OpenAI: The Evolution of Third-Party Risk
  • Link11 Identifies Five Cybersecurity Trends Shaping European Defense Strategies in 2026
  • Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
  • LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS
  • From Open Source to OpenAI: The Evolution of Third-Party Risk
  • Link11 Identifies Five Cybersecurity Trends Shaping European Defense Strategies in 2026
  • Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark