Techy StatusTechy Status

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Tecno Pova Curve 2 5G Launched: 144Hz AMOLED & 8,000mAh Power

    February 13, 2026

    AI.com domain purchase Confirmed: Crypto.com’s $70M Super Bowl Bet

    February 9, 2026

    India Deep Tech Startup Rules Confirmed: 7 Key Changes

    February 9, 2026
    Facebook Twitter Instagram
    Facebook Twitter Instagram
    Techy Status Techy Status
    • Home
    • News & Updates
    • PC & Mobile
      • Android
      • IOS
      • Linux
      • Windows
    • Development
      • Laravel
      • Microservices
    • Productivity
    • AI
    Techy StatusTechy Status
    Home»News & Updates»Notepad++ Updater Hack: Chinese Hackers Targeted Users for Months
    News & Updates

    Notepad++ Updater Hack: Chinese Hackers Targeted Users for Months

    Sarath Prasad T SBy Sarath Prasad T SFebruary 4, 2026No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email Reddit WhatsApp

    Notepad++ has revealed that its software update process was secretly compromised for several months in a targeted cyber operation believed to be linked to Chinese state-backed hackers. During the incident, a small number of users were redirected to malicious servers. The issue has since been resolved, and additional security safeguards have been implemented.

    According to reports, the developer behind Notepad++ discovered that its update infrastructure had been quietly manipulated last year. Evidence suggests the activity was carried out by a government-aligned Chinese threat group.

    As reported by BleepingComputer, the attackers intercepted update requests and selectively rerouted certain users to harmful servers, serving altered update data. The intrusion is thought to have started in June 2025 and continued until early December.

    Highly targeted attack

    Instead of launching a widespread campaign, the attackers reportedly focused on specific individuals or organisations. Investigators said only a limited number of systems were affected, indicating deliberate and precise targeting.

    Security analysts involved in the investigation noted that the operation’s narrow scope and technical complexity strongly suggest the involvement of a state-sponsored actor. Several independent researchers have linked the activity to a China-aligned hacking group.

    The attackers are believed to have taken advantage of security gaps in older versions of Notepad++’s WinGUp update utility, which lacked robust verification mechanisms for update files.

    Possible hosting provider breach

    Logs from the hosting provider reportedly show signs that the server used by the Notepad++ updater was compromised. This may have allowed the attackers to alter traffic and distribute malicious update instructions.

    The attack appeared to pause briefly in early September after server firmware and kernel updates were applied. However, the threat actors allegedly regained access using internal service credentials that had not been changed.

    The unauthorised access continued until December 2, 2025, when suspicious activity was detected and the hosting provider shut down the connection.

    Security improvements implemented

    Following the incident, Notepad++ moved its infrastructure to a new hosting environment with enhanced security controls. The development team also rotated exposed credentials, fixed vulnerabilities and conducted a full log review to ensure the attack had been neutralised.

    In December, Notepad++ released version 8.8.9, which addressed weaknesses in the WinGUp updater. From that version onward, update files and installer certificates are verified, and update configuration files are cryptographically signed.

    An additional update planned for version 8.9.2 will make certificate signature verification mandatory for all updates.

    Users advised to stay vigilant

    Although the attack appears to have affected only a limited number of users, Notepad++ recommends taking precautionary measures. These include changing SSH, FTP/SFTP and database credentials, auditing WordPress admin accounts, removing unused users and enabling automatic updates for software, plugins and themes.

    Security researcher Kevin Beaumont previously noted that at least three organisations experienced follow-up surveillance activity after being impacted by the compromised update system.

    Chinese hackers cybersecurity news Notepad++ security breach Notepad++ updater hack software update attack Windows software security
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Reddit WhatsApp
    Previous ArticleGoogle Gemini May Let Users Transfer ChatGPT Chats Easily
    Next Article Firefox 148 adds new AI settings that give users full control

    Related Posts

    Tecno Pova Curve 2 5G Launched: 144Hz AMOLED & 8,000mAh Power

    February 13, 2026

    AI.com domain purchase Confirmed: Crypto.com’s $70M Super Bowl Bet

    February 9, 2026

    India Deep Tech Startup Rules Confirmed: 7 Key Changes

    February 9, 2026

    Reddit Adtech Acquisitions Confirmed: 5 Growth Signals

    February 7, 2026
    Add A Comment

    Leave A Reply Cancel Reply

    Editors Picks

    iPhone 18 Pro Max Battery Leak: 7 Powerful Upgrades That Could Redefine Battery Life

    February 7, 2026

    Apple iPhone 17e Launch in February 2026: 7 Powerful Reasons This Budget iPhone Could Change Everything

    February 7, 2026

    OpenAI Enters the Agentic Coding Race With New macOS Codex App

    February 4, 2026

    Hostmargin Crowned Top 25 Web Hosting Provider in 2026

    February 2, 2026
    Advertisement
    Techy Status
    Facebook Twitter Instagram YouTube
    © 2026 TechyStatus.com. Managed by Bi. Enterprises.

    Type above and press Enter to search. Press Esc to cancel.

    • English
    • Malayalam