Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers

Posted on February 2, 2026February 2, 2026 By CWS

The developer of Notepad++ has confirmed {that a} focused assault by a possible Chinese language state-sponsored risk actor compromised the challenge’s former shared internet hosting infrastructure between June and December 2025.

The breach allowed attackers to intercept and selectively redirect replace visitors to malicious servers, exploiting a weak point in how the software program validated replace packages earlier than the discharge of model 8.8.9.

Infrastructure-Degree Hijacking

In line with the forensic evaluation carried out by unbiased safety consultants and the previous internet hosting supplier, the compromise occurred on the infrastructure stage relatively than by a vulnerability within the Notepad++ codebase itself. The attackers gained entry to the shared internet hosting server, permitting them to intercept requests destined for notepad-plus-plus.org.

The assault particularly focused the getDownloadUrl.php script utilized by the applying’s updater. By controlling this endpoint, the risk actors may selectively redirect particular customers to attacker-controlled servers internet hosting malicious binaries.

These malicious payloads have been served as an alternative of the legit replace, leveraging the truth that older variations of the updater (WinGUp) didn’t strictly implement certificates and signature validation for downloaded installers.

A number of unbiased safety researchers have assessed that the marketing campaign was seemingly carried out by a Chinese language state-sponsored group. The concentrating on was described as “extremely selective,” specializing in particular customers relatively than a broad supply-chain an infection.

The compromise spanned roughly six months, with the internet hosting supplier figuring out two distinct phases of unauthorized entry:

DateEvent DescriptionJune 2025Initial Compromise: Attackers achieve entry to the shared internet hosting server.September 2, 2025Server Entry Misplaced: A scheduled upkeep replace (kernel/firmware) by the supplier severed the attackers’ direct server entry.Sept 2 – Dec 2, 2025Credential Persistence: Attackers maintained entry through stolen inner service credentials, permitting continued visitors redirection regardless of dropping server management.November 10, 2025Attack Ceased (Estimate): Safety consultants notice the energetic assault marketing campaign appeared to halt round this date.December 2, 2025Access Terminated: Internet hosting supplier rotated all credentials and accomplished safety hardening, definitively blocking the attackers.December 9, 2025Mitigation Launched: Notepad++ v8.8.9 launched with hardened replace verification.

The internet hosting supplier confirmed that no different purchasers on the shared server have been focused; the attackers particularly hunted for the Notepad++ area. In response to the incident, the Notepad++ web site has been migrated to a brand new supplier with enhanced safety protocols.

To stop comparable hijacking makes an attempt, Notepad++ model 8.8.9 launched strict validation inside WinGUp, requiring each a legitimate digital signature and an identical certificates for any downloaded installer. If these verifications fail, the replace course of is now routinely aborted.

Trying forward, the challenge is implementing the XMLDSig (XML Digital Signature) normal for replace manifests. This reinforcement will be sure that the XML information returned by the replace server is cryptographically signed, stopping tampering with the obtain URLs. This function is scheduled for enforcement in model 8.9.2, anticipated to be launched throughout the subsequent month.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Actors, Hijacked, Malicious, Notepad, Redirect, Servers, StateSponsored, Update, Users

Post navigation

Previous Post: Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks
Next Post: Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

Related Posts

Google Announces Full Availability of Client-Side Encryption for Google Sheets Cyber Security News
APT Hackers Attacking Maritime and Shipping Industry to Launch Ransomware Attacks Cyber Security News
New Multi-Stage Tycoon2FA Phishing Attack Now Beats Top Security Systems Cyber Security News
Critical RCE Vulnerabilities in AI inference Engines Exposes Meta, Nvidia and Microsoft Frameworks Cyber Security News
Defy Security Appoints Esteemed Cybersecurity Leader Gary Warzala to Its Board of Directors Cyber Security News
Hackers Leverage Judicial Notifications to Deploy Info-Stealer Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
  • Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
  • State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers
  • Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks
  • Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
  • Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
  • State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers
  • Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks
  • Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark