Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Notepad++ Patches Updater Flaw After Reports of Traffic Hijacking

Posted on December 12, 2025December 12, 2025 By CWS

Latest Notepad++ releases deal with a vulnerability that has allowed risk actors to hijack the free supply code editor’s updater. 

Safety researcher Kevin Beaumont reported in early December {that a} handful of organizations utilizing Notepad++ had reported experiencing safety incidents involving the code editor.

Beaumont mentioned in an replace this week that the assaults appeared to have been carried out by risk actors in China, with the attackers leveraging a Notepad++ vulnerability for preliminary entry to the programs of telecoms and monetary providers companies in East Asia.

Notepad++ builders appear to have identified about points with the updater since no less than mid-November, when model 8.8.8 launch notes talked about a safety enhancement designed to stop the appliance’s updater from being hijacked.

In a put up revealed this week to announce the discharge of model 8.8.9, Notepad++ confirmed that visitors from the updater (WinGUp) was in some circumstances redirected to malicious servers, which resulted in compromised executable recordsdata being downloaded to the sufferer’s system.

Notepad++ builders’ investigation led to the invention of a flaw in the way in which the updater validates the authenticity and integrity of replace recordsdata.

“In case an attacker is ready to intercept the community visitors between the updater shopper and the Notepad++ replace infrastructure, this weak point could be leveraged by an attacker to immediate the updater to obtain and executed an undesirable binary (as a substitute of the respectable Notepad++ replace binary).”

Within the newest model, Notepad++ and the WinGUp element confirm the signature of downloaded installers throughout the replace course of, and the replace shouldn’t be carried out if the verify fails.

Nevertheless, it has but to be decided precisely how visitors has been hijacked within the wild.Commercial. Scroll to proceed studying.

Beaumont, who described the marketing campaign as a provide chain assault, believes risk actors could also be hijacking visitors on the ISP degree to push malicious updates, however identified that vital sources are required to conduct such an assault.

Associated: Google Patches Mysterious Chrome Zero-Day Exploited within the Wild

Associated: Huge Vary of Malware Delivered in React2Shell Assaults

Associated: Unpatched Gogs Zero-Day Exploited for Months

Security Week News Tags:Flaw, Hijacking, Notepad, Patches, Reports, Traffic, Updater

Post navigation

Previous Post: New BlackForce Phishing Kit Lets Attackers Steal Credentials Using MitB Attacks and Bypass MFA
Next Post: Microsoft Bug Bounty Program Expanded to Third-Party Code

Related Posts

Scattered Spider Targeting VMware vSphere Environments Security Week News
$1M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal Security Week News
Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names Security Week News
Atlassian Patches Critical Apache Tika Flaw Security Week News
Dartmouth College Confirms Data Theft in Oracle Hack Security Week News
Hundreds of N-able N-central Instances Affected by Exploited Vulnerabilities Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data
  • JumpCloud Remote Assist Vulnerability Can Expose Systems to Takeover
  • Why Data Security and Privacy Need to Start in Code
  • Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass
  • User Data Compromised in SoundCloud Hack 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data
  • JumpCloud Remote Assist Vulnerability Can Expose Systems to Takeover
  • Why Data Security and Privacy Need to Start in Code
  • Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass
  • User Data Compromised in SoundCloud Hack 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark