Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Notepad++ Supply Chain Hack Conducted by China via Hosting Provider

Posted on February 2, 2026February 2, 2026 By CWS

Notepad++ on Monday shared extra particulars on the provision chain assault that got here to gentle in December 2025, saying {that a} menace actor seemingly sponsored by the Chinese language authorities focused some prospects by means of its internet hosting supplier.

Information of the incident broke after Notepad++ launched updates designed to stop the free supply code editor’s updater from being hijacked. 

Safety researcher Kevin Beaumont reported in early December {that a} handful of organizations utilizing Notepad++ had been focused with malicious software program updates. 

The researcher mentioned on the time that China-linked hackers had exploited Notepad++ to realize preliminary entry to the programs of telecoms and monetary companies companies in East Asia. 

Notepad++ creator and maintainer Don Ho has now made public the outcomes of an investigation carried out in collaboration with exterior safety specialists and the shared internet hosting supplier whose companies had been used on the time of the assault.

“In response to the evaluation offered by the safety specialists, the assault concerned infrastructure-level compromise that allowed malicious actors to intercept and redirect replace site visitors destined for notepad-plus-plus.org,” Ho defined.  Commercial. Scroll to proceed studying.

He added, “The precise technical mechanism stays beneath investigation, although the compromise occurred on the internet hosting supplier stage somewhat than by means of vulnerabilities in Notepad++ code itself. Visitors from sure focused customers was selectively redirected to attacker-controlled server malicious replace manifests.”

“A number of impartial safety researchers have assessed that the menace actor is probably going a Chinese language state-sponsored group, which might clarify the extremely selective concentrating on noticed through the marketing campaign,” Ho famous.

Data collected through the internet hosting supplier’s investigation revealed that the attackers particularly focused Notepad++ to intercept its customers’ site visitors. The supplier discovered no proof that different prospects on the shared server had been focused.

The assault seems to have began in June 2025 and the internet hosting agency decided that the server focused by the hackers was compromised till September 2, when the system underwent scheduled upkeep and its kernel and firmware had been up to date.

Nonetheless, credentials obtained by the attackers earlier than September allowed them to keep up entry to the internet hosting supplier’s inside companies till December 2. Throughout this timeframe the menace actor was in a position to direct site visitors going to Notepad++ replace servers to its personal servers to ship malware.

Notepad++ has since migrated to a brand new internet hosting supplier and carried out client-side modifications to confirm replace integrity.

Associated: eScan Antivirus Delivers Malware in Provide Chain Assault

Associated: Infostealer Malware Delivered in EmEditor Provide Chain Assault

Associated: ‘PackageGate’ Flaws Open JavaScript Ecosystem to Provide Chain Assaults

Security Week News Tags:Chain, China, Conducted, Hack, Hosting, Notepad, Provider, Supply

Post navigation

Previous Post: Arsink Rat Attacking Android Devices to Exfiltrate Sensitive Data and Enable Remote Access
Next Post: Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note

Related Posts

iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals Security Week News
Undetectable Android Spyware Backfires, Leaks 62,000 User Logins Security Week News
Exploitation of React2Shell Surges – SecurityWeek Security Week News
Fluent Bit Vulnerabilities Expose Cloud Services to Takeover Security Week News
In Other News: Microsoft Finds AMD CPU Flaws, ZuRu macOS Malware Evolves, DoNot APT Targets Govs Security Week News
Cybersecurity Firms React to China’s Reported Software Ban Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cyber Insights 2026: Malware and Cyberattacks in the Age of AI
  • Japan, Britain to Boost Cybersecurity and Critical Minerals Cooperation as China’s Influence Grows
  • Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note
  • Notepad++ Supply Chain Hack Conducted by China via Hosting Provider
  • Arsink Rat Attacking Android Devices to Exfiltrate Sensitive Data and Enable Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cyber Insights 2026: Malware and Cyberattacks in the Age of AI
  • Japan, Britain to Boost Cybersecurity and Critical Minerals Cooperation as China’s Influence Grows
  • Hackers Attacking MongoDB Instances to Delete Database and Add Ransom Note
  • Notepad++ Supply Chain Hack Conducted by China via Hosting Provider
  • Arsink Rat Attacking Android Devices to Exfiltrate Sensitive Data and Enable Remote Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark