Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers

Posted on February 2, 2026February 2, 2026 By CWS

The developer of Notepad++ has confirmed {that a} focused assault by a possible Chinese language state-sponsored risk actor compromised the challenge’s former shared internet hosting infrastructure between June and December 2025.

The breach allowed attackers to intercept and selectively redirect replace visitors to malicious servers, exploiting a weak point in how the software program validated replace packages earlier than the discharge of model 8.8.9.

Infrastructure-Degree Hijacking

In line with the forensic evaluation carried out by unbiased safety consultants and the previous internet hosting supplier, the compromise occurred on the infrastructure stage relatively than by a vulnerability within the Notepad++ codebase itself. The attackers gained entry to the shared internet hosting server, permitting them to intercept requests destined for notepad-plus-plus.org.

The assault particularly focused the getDownloadUrl.php script utilized by the applying’s updater. By controlling this endpoint, the risk actors may selectively redirect particular customers to attacker-controlled servers internet hosting malicious binaries.

These malicious payloads have been served as an alternative of the legit replace, leveraging the truth that older variations of the updater (WinGUp) didn’t strictly implement certificates and signature validation for downloaded installers.

A number of unbiased safety researchers have assessed that the marketing campaign was seemingly carried out by a Chinese language state-sponsored group. The concentrating on was described as “extremely selective,” specializing in particular customers relatively than a broad supply-chain an infection.

The compromise spanned roughly six months, with the internet hosting supplier figuring out two distinct phases of unauthorized entry:

DateEvent DescriptionJune 2025Initial Compromise: Attackers achieve entry to the shared internet hosting server.September 2, 2025Server Entry Misplaced: A scheduled upkeep replace (kernel/firmware) by the supplier severed the attackers’ direct server entry.Sept 2 – Dec 2, 2025Credential Persistence: Attackers maintained entry through stolen inner service credentials, permitting continued visitors redirection regardless of dropping server management.November 10, 2025Attack Ceased (Estimate): Safety consultants notice the energetic assault marketing campaign appeared to halt round this date.December 2, 2025Access Terminated: Internet hosting supplier rotated all credentials and accomplished safety hardening, definitively blocking the attackers.December 9, 2025Mitigation Launched: Notepad++ v8.8.9 launched with hardened replace verification.

The internet hosting supplier confirmed that no different purchasers on the shared server have been focused; the attackers particularly hunted for the Notepad++ area. In response to the incident, the Notepad++ web site has been migrated to a brand new supplier with enhanced safety protocols.

To stop comparable hijacking makes an attempt, Notepad++ model 8.8.9 launched strict validation inside WinGUp, requiring each a legitimate digital signature and an identical certificates for any downloaded installer. If these verifications fail, the replace course of is now routinely aborted.

Trying forward, the challenge is implementing the XMLDSig (XML Digital Signature) normal for replace manifests. This reinforcement will be sure that the XML information returned by the replace server is cryptographically signed, stopping tampering with the obtain URLs. This function is scheduled for enforcement in model 8.9.2, anticipated to be launched throughout the subsequent month.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Actors, Hijacked, Malicious, Notepad, Redirect, Servers, StateSponsored, Update, Users

Post navigation

Previous Post: Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks
Next Post: Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

Related Posts

Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed Cyber Security News
IT Giant Ingram Micro Restores Operations Following Ransomware Attack Cyber Security News
Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website Cyber Security News
U.S. Secret Service Dismantles 300 SIM Servers and 100,000 SIM Cards Cyber Security News
INE Security Expands Across Middle East and Asia to Accelerate Cybersecurity Upskillin Cyber Security News
CISA Warns of OpenPLC ScadaBR cross-site scripting vulnerability Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 1-Click Clawdbot Vulnerability Enable Malicious Remote Code Execution Attacks
  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
  • Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
  • State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers
  • Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 1-Click Clawdbot Vulnerability Enable Malicious Remote Code Execution Attacks
  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
  • Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
  • State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers
  • Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark