Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users

Posted on February 2, 2026February 2, 2026 By CWS

Ravie LakshmananFeb 02, 2026Threat Intelligence / Malware
The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility’s replace mechanism to redirect replace visitors to malicious servers as a substitute.
“The assault concerned [an] infrastructure-level compromise that allowed malicious actors to intercept and redirect replace visitors destined for notepad-plus-plus.org,” developer Don Ho stated. “The compromise occurred on the internet hosting supplier degree fairly than by means of vulnerabilities in Notepad++ code itself.”
The precise mechanism by means of which this was realized is at the moment being investigated, Ho added.
The event comes slightly over a month after Notepad++ launched model 8.8.9 to handle a difficulty that resulted in visitors from WinGUp, the Notepad++ updater, being “often” redirected to malicious domains, ensuing within the obtain of poisoned executables.

Particularly, the issue stemmed from the way in which the updater verified the integrity and authenticity of the downloaded replace file, permitting an attacker who is ready to intercept community visitors between the updater consumer and the replace server to trick the software into downloading a distinct binary as a substitute.
It is believed this redirection was extremely focused, with visitors originating from solely sure customers routed to the rogue servers and fetching the malicious elements. The incident is assessed to have commenced in June 2025, greater than six months earlier than it got here to gentle.
Unbiased safety researcher Kevin Beaumont revealed that the flaw was being exploited by risk actors in China to hijack networks and deceive targets into downloading malware. In response to the safety incident, the Notepad++ web site has been migrated to a brand new internet hosting supplier.
“In response to the previous internet hosting supplier, the shared internet hosting server was compromised till September 2, 2025,” Ho defined. “Even after dropping server entry, attackers maintained credentials to inside providers till December 2, 2025, which allowed them to proceed redirecting Notepad++ replace visitors to malicious servers.”

The Hacker News Tags:Deliver, Hijacked, Malware, Mechanism, Notepad, Official, Select, Update, Users

Post navigation

Previous Post: Google Uncovered Significant Expansion in ShinyHunters Threat Activity with New Tactics
Next Post: Arsink Rat Attacking Android Devices to Exfiltrate Sensitive Data and Enable Remote Access

Related Posts

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities The Hacker News
Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks The Hacker News
Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments The Hacker News
Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims The Hacker News
SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass The Hacker News
AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News