Chinese State Hackers Hijack Notepad++ Update System in Targeted Cyber Campaign
Chinese Hackers Target Notepad++ Users via Update Hijack

In a sophisticated cyber espionage operation, the popular text editor Notepad++ had its software update system covertly hijacked for several months, with strong evidence pointing towards Chinese state-sponsored threat actors. The targeted campaign, which ran from June to December 2025, selectively redirected specific users to malicious servers rather than employing a broad-based attack.

Selective Targeting of Users Points to State-Backed Actors

Security experts investigating the breach noted that the attackers demonstrated remarkable precision in their targeting. Rather than affecting the entire Notepad++ user base, the redirections were highly selective, focusing only on chosen systems. This narrow scope, combined with the technical sophistication of the intrusion, strongly suggests the involvement of a state-backed actor with specific intelligence objectives.

Exploitation of Update Tool Vulnerabilities

The attackers reportedly exploited weaknesses in older versions of Notepad++'s WinGUp update tool, which lacked sufficient verification checks for update files. This vulnerability allowed the threat actors to intercept and manipulate update requests, steering targeted users toward compromised servers that delivered tampered update information.

Hosting Provider Compromise and Persistent Access

Investigators discovered that the server supporting Notepad++'s update application was compromised, likely through the hosting provider. This breach enabled the attackers to manipulate traffic and deliver malicious update manifests. Although the intrusion was temporarily disrupted in early September following server upgrades, the threat actors reportedly regained access using internal service credentials that had not been properly rotated.

The unauthorized access persisted until December 2, 2025, when the hosting provider finally detected suspicious activity and terminated the connection. This extended period of compromise allowed the attackers to maintain their foothold within the update infrastructure for months.

Security Enhancements and Protective Measures

In response to the breach, the Notepad++ development team has implemented comprehensive security improvements. The infrastructure has been migrated to a new hosting provider with stronger safeguards, and all potentially exposed credentials have been rotated. The team has conducted thorough log reviews to confirm that all malicious activity has ceased.

Notepad++ version 8.8.9, released in December 2025, addressed critical issues in the WinGUp updater. From this release onward, installer certificates and signatures undergo verification, and update XML files are cryptographically signed. The upcoming version 8.9.2 will introduce mandatory certificate signature verification for all updates, providing an additional layer of security.

User Security Recommendations

Although the campaign appears to have been limited in scope, security experts recommend that users take proactive measures to strengthen their security posture. Recommended precautions include:

  • Changing SSH, FTP/SFTP, and MySQL credentials
  • Reviewing WordPress administrator accounts and removing unnecessary users
  • Enabling automatic updates for core software, plugins, and themes
  • Implementing multi-factor authentication where available

Security researcher Kevin Beaumont has warned that at least three organizations experienced follow-up reconnaissance activity after being affected by the hijacked updates, indicating that the threat actors may have been gathering intelligence for subsequent operations.

The Notepad++ incident highlights the growing sophistication of state-sponsored cyber campaigns that target software supply chains. As developers and users become more aware of these threats, implementing robust security measures throughout the update process becomes increasingly critical to prevent similar breaches in the future.