Notepad++ users take note: It's time to check if you're hacked
Last edited Wed Feb 4, 2026, 01:02 PM - Edit history (1)
Also: Notepad++ Hijacked by State-Sponsored Hackers (Notepad++)
credit to YouTuber SomeOrdinaryGamers for the heads up
________________________________________________
Source: Ars Technica
Notepad++ users take note: Its time to check if youre hacked
Suspected China-state hackers used update infrastructure to deliver backdoored version.
Dan Goodin Feb 2, 2026 3:30 PM
Infrastructure delivering updates for Notepad++a widely used text editor for Windowswas compromised for six months by suspected China-state hackers who used their control to deliver backdoored versions of the app to select targets, developers said Monday.
I deeply apologize to all users affected by this hijacking, the author of a post published to the official notepad-plus-plus.org site wrote Monday. The post said that the attack began last June with an infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org. The attackers, whom multiple investigators tied to the Chinese government, then selectively redirected certain targeted users to malicious update servers where they received backdoored updates. Notepad++ didnt regain control of its infrastructure until December.
The attackers used their access to install a never-before-seen payload that has been dubbed Chrysalis. Security firm Rapid 7 descrbed it as a custom, feature-rich backdoor.
Its wide array of capabilities indicates it is a sophisticated and permanent tool, not a simple throwaway utility, company researchers said.
-snip-
Read more: https://arstechnica.com/security/2026/02/notepad-updater-was-compromised-for-6-months-in-supply-chain-attack/
________________________________________________
Source: Notepad++
Notepad++ Hijacked by State-Sponsored Hackers
2026-02-02
Following the security disclosure published in the v8.8.9 announcement
https://notepad-plus-plus.org/news/v889-released/
the investigation has continued in collaboration with external experts and with the full involvement of my (now former) shared hosting provider.
According to the analysis provided by the security experts, the attack involved infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org. The exact technical mechanism remains under investigation, though the compromise occurred at the hosting provider level rather than through vulnerabilities in Notepad++ code itself. Traffic from certain targeted users was selectively redirected to attacker-controlled malicious update manifests.
The incident began in June 2025. Multiple independent security researchers have assessed that the threat actor is likely a Chinese state-sponsored group, which would explain the highly selective targeting observed during the campaign.
An incident-response (IR) plan was proposed by the security expert, and I facilitated direct communication between the hosting provider and the IR team. After the IR team engaged with the provider and reviewed the situation, I received the following detailed statement from the provider:
Dear Customer,
We want to further update you following the previous communication with us about your server compromise and further investigation with your incident response team.
We discovered the suspicious events in our logs, which indicate that the server (where your application https://notepad-plus-plus.org/update/getDownloadUrl.php was hosted until the 1st of December, 2025) could have been compromised.
As a precautionary measure, we immediately transferred all clients web hosting subscriptions from this server to a new server and continued our further investigation.
-snip-
Read more: https://notepad-plus-plus.org/news/hijacked-incident-info-update/
LearnedHand
(5,290 posts)So glad CISA is on the job protecting us.
Nittersing
(8,207 posts)Eugene
(66,932 posts)It has additional features, especially useful for editing source code and other syntax-based text files.
... and there's no goddamned Copilot.