Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers

State-Sponsored Actors Hijacked Notepad++ Update to Redirect Users to Malicious Servers

Posted on February 2, 2026February 2, 2026 By CWS

The developer of Notepad++ has confirmed {that a} focused assault by a possible Chinese language state-sponsored risk actor compromised the challenge’s former shared internet hosting infrastructure between June and December 2025.

The breach allowed attackers to intercept and selectively redirect replace visitors to malicious servers, exploiting a weak point in how the software program validated replace packages earlier than the discharge of model 8.8.9.

Infrastructure-Degree Hijacking

In line with the forensic evaluation carried out by unbiased safety consultants and the previous internet hosting supplier, the compromise occurred on the infrastructure stage relatively than by a vulnerability within the Notepad++ codebase itself. The attackers gained entry to the shared internet hosting server, permitting them to intercept requests destined for notepad-plus-plus.org.

The assault particularly focused the getDownloadUrl.php script utilized by the applying’s updater. By controlling this endpoint, the risk actors may selectively redirect particular customers to attacker-controlled servers internet hosting malicious binaries.

These malicious payloads have been served as an alternative of the legit replace, leveraging the truth that older variations of the updater (WinGUp) didn’t strictly implement certificates and signature validation for downloaded installers.

A number of unbiased safety researchers have assessed that the marketing campaign was seemingly carried out by a Chinese language state-sponsored group. The concentrating on was described as “extremely selective,” specializing in particular customers relatively than a broad supply-chain an infection.

The compromise spanned roughly six months, with the internet hosting supplier figuring out two distinct phases of unauthorized entry:

DateEvent DescriptionJune 2025Initial Compromise: Attackers achieve entry to the shared internet hosting server.September 2, 2025Server Entry Misplaced: A scheduled upkeep replace (kernel/firmware) by the supplier severed the attackers’ direct server entry.Sept 2 – Dec 2, 2025Credential Persistence: Attackers maintained entry through stolen inner service credentials, permitting continued visitors redirection regardless of dropping server management.November 10, 2025Attack Ceased (Estimate): Safety consultants notice the energetic assault marketing campaign appeared to halt round this date.December 2, 2025Access Terminated: Internet hosting supplier rotated all credentials and accomplished safety hardening, definitively blocking the attackers.December 9, 2025Mitigation Launched: Notepad++ v8.8.9 launched with hardened replace verification.

The internet hosting supplier confirmed that no different purchasers on the shared server have been focused; the attackers particularly hunted for the Notepad++ area. In response to the incident, the Notepad++ web site has been migrated to a brand new supplier with enhanced safety protocols.

To stop comparable hijacking makes an attempt, Notepad++ model 8.8.9 launched strict validation inside WinGUp, requiring each a legitimate digital signature and an identical certificates for any downloaded installer. If these verifications fail, the replace course of is now routinely aborted.

Trying forward, the challenge is implementing the XMLDSig (XML Digital Signature) normal for replace manifests. This reinforcement will be sure that the XML information returned by the replace server is cryptographically signed, stopping tampering with the obtain URLs. This function is scheduled for enforcement in model 8.9.2, anticipated to be launched throughout the subsequent month.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Actors, Hijacked, Malicious, Notepad, Redirect, Servers, StateSponsored, Update, Users

Post navigation

Previous Post: Critical Johnson Controls Products Vulnerabilities Enables Remote SQL Injection Attacks
Next Post: Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

Related Posts

Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers Cyber Security News
Anthropic Unveils Enhanced Claude Sonnet 4.6 Model Anthropic Unveils Enhanced Claude Sonnet 4.6 Model Cyber Security News
Scattered Lapsus$ Hunters Registered 40+ Domains Mimicking Zendesk Environments Scattered Lapsus$ Hunters Registered 40+ Domains Mimicking Zendesk Environments Cyber Security News
React Native’s Metro Server Targeted by Hackers React Native’s Metro Server Targeted by Hackers Cyber Security News
Hackers Could Take Control of Car Dashboard by Hacking Its Modem Hackers Could Take Control of Car Dashboard by Hacking Its Modem Cyber Security News
AI Security Frameworks – Ensuring Trust in Machine Learning AI Security Frameworks – Ensuring Trust in Machine Learning Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark