Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers

State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers

Posted on February 2, 2026February 2, 2026 By CWS

The developer of Notepad++ has confirmed {that a} focused assault by a possible Chinese language state-sponsored risk actor compromised the challenge’s former shared internet hosting infrastructure between June and December 2025.

The breach allowed attackers to intercept and selectively redirect replace visitors to malicious servers, exploiting a weak point in how the software program validated replace packages earlier than the discharge of model 8.8.9.

Infrastructure-Degree Hijacking

In line with the forensic evaluation carried out by unbiased safety consultants and the previous internet hosting supplier, the compromise occurred on the infrastructure stage relatively than by a vulnerability within the Notepad++ codebase itself. The attackers gained entry to the shared internet hosting server, permitting them to intercept requests destined for notepad-plus-plus.org.

The assault particularly focused the getDownloadUrl.php script utilized by the applying’s updater. By controlling this endpoint, the risk actors may selectively redirect particular customers to attacker-controlled servers internet hosting malicious binaries.

These malicious payloads have been served as an alternative of the legit replace, leveraging the truth that older variations of the updater (WinGUp) didn’t strictly implement certificates and signature validation for downloaded installers.

A number of unbiased safety researchers have assessed that the marketing campaign was seemingly carried out by a Chinese language state-sponsored group. The concentrating on was described as “extremely selective,” specializing in particular customers relatively than a broad supply-chain an infection.

The compromise spanned roughly six months, with the internet hosting supplier figuring out two distinct phases of unauthorized entry:

DateEvent DescriptionJune 2025Initial Compromise: Attackers achieve entry to the shared internet hosting server.September 2, 2025Server Entry Misplaced: A scheduled upkeep replace (kernel/firmware) by the supplier severed the attackers’ direct server entry.Sept 2 – Dec 2, 2025Credential Persistence: Attackers maintained entry through stolen inner service credentials, permitting continued visitors redirection regardless of dropping server management.November 10, 2025Attack Ceased (Estimate): Safety consultants notice the energetic assault marketing campaign appeared to halt round this date.December 2, 2025Access Terminated: Internet hosting supplier rotated all credentials and accomplished safety hardening, definitively blocking the attackers.December 9, 2025Mitigation Launched: Notepad++ v8.8.9 launched with hardened replace verification.

The internet hosting supplier confirmed that no different purchasers on the shared server have been focused; the attackers particularly hunted for the Notepad++ area. In response to the incident, the Notepad++ web site has been migrated to a brand new supplier with enhanced safety protocols.

To stop comparable hijacking makes an attempt, Notepad++ model 8.8.9 launched strict validation inside WinGUp, requiring each a legitimate digital signature and an identical certificates for any downloaded installer. If these verifications fail, the replace course of is now routinely aborted.

Trying forward, the challenge is implementing the XMLDSig (XML Digital Signature) normal for replace manifests. This reinforcement will be sure that the XML information returned by the replace server is cryptographically signed, stopping tampering with the obtain URLs. This function is scheduled for enforcement in model 8.9.2, anticipated to be launched throughout the subsequent month.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Actors, Hijacked, Malicious, Notepad, Redirect, Servers, StateSponsored, Update, Users

Post navigation

Previous Post: Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks
Next Post: Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

Related Posts

Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched Seven QNAP Zero-Day Vulnerabilities Exploited at Pwn2Own 2025 Now Patched Cyber Security News
Indian Authorities Dismantled Cybercriminals That Impersonate as Microsoft Tech Support Indian Authorities Dismantled Cybercriminals That Impersonate as Microsoft Tech Support Cyber Security News
MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules MEDUSA Security Testing Tool With 74 Scanners and 180+ AI Agent Security Rules Cyber Security News
Crypto Developers Attacked With Malicious npm Packages to Steal Login Details Crypto Developers Attacked With Malicious npm Packages to Steal Login Details Cyber Security News
MathWorks Confirms Cyberattack, User Personal Information Stolen MathWorks Confirms Cyberattack, User Personal Information Stolen Cyber Security News
New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access New Cephalus Ransomware Leverages Remote Desktop Protocol to Gain Initial Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News