Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Notepad++ Update Hijacking Linked to Hosting Provider Compromise
Cyber Security

Notepad++ Update Hijacking Linked to Hosting Provider Compromise

Team-CWDBy Team-CWDFebruary 2, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A months-long supply chain attack that affected the Notepad++ update process has been linked to a compromise of shared hosting infrastructure rather than a flaw in the software’s code. This according to an ongoing investigation involving external security experts and the project’s former hosting provider.

An advisory published by the developer on February 2 said the incident involved the redirection of update traffic intended for notepad-plus-plus.org to attacker-controlled servers.

In some cases, users downloading updates through WinGUp, the built-in updater, were served malicious manifests that pointed to compromised executables. The issue was first publicly disclosed alongside the Notepad++ v8.8.9 release in December 2025.

Attack Exploited Hosting Infrastructure

Security analysts concluded that attackers gained access at the hosting provider level, enabling them to intercept and manipulate traffic bound for the Notepad++ update endpoint. No vulnerabilities were identified in the Notepad++ codebase itself. Instead, the attackers abused weaknesses in how update integrity was verified in older versions of the software.

“This is a concerning attack that offered state sponsored actors the ability to carry out an infrastructure level compromise,” said Donnan Mallon, threat intelligence analyst at Talion. “This allowed attackers to gain access to the shared hosting server, which let them intercept requests meant for notepad-plus-plus.org.”

According to multiple independent researchers, the attackers selectively targeted the Notepad++ domain rather than other customers hosted on the same server. This highly focused activity has led analysts to assess that the threat actor was likely a Chinese state-sponsored group.

The compromise is believed to have begun in June 2025. Logs reviewed by the former hosting provider indicate that direct server access by the attackers ended on September 2, 2025, following scheduled kernel and firmware updates. However, credentials associated with internal services remained exposed until December 2, 2025, allowing continued traffic redirection after server access was lost.

“This is a supply chain compromise, which highlights why supply chain risk continues to rank among the highest-impact issues in frameworks like the OWASP Top 10,” commented Michael Jepson, penetration testing manager at CybaVerse. “The weakness was not in the application code, but higher up the trust chain.”

Read more on supply chain security: Precision Becomes the New Playbook for Software Supply Chain Attacks

The hosting provider stated that no similar malicious patterns were found on other servers and that no additional customers were affected. All exposed credentials were rotated, vulnerabilities were patched and further exploitation attempts were blocked by early December.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleBeware of Winter Olympics scams and other cyberthreats
Next Article Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities
Team-CWD
  • Website

Related Posts

Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Cyber Security

Sophos CISO on Software Flaws, Vendor Risk and Secure by Design

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How the always-on generation can level up their cybersecurity game

September 11, 2025

Your information is on the dark web. What happens next?

January 13, 2026

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.