Advisory on Notepad++ Update Servers Hijacked to Redirect Users to Malicious Servers
Overview
Notepad++ disclosed a targeted supply?chain compromise involving its software update infrastructure. Forensic analysis conducted by independent security experts and the former hosting provider confirmed that the incident resulted from an infrastructure?level hijacking, rather than a vulnerability in the Notepad++ application codebase.
Between June 2025 and December 2025, malicious actors gained access to the shared hosting environment used by Notepad++ and leveraged this position to intercept and selectively redirect update traffic destined for notepad-plus-plus.org. The campaign was highly selective, impacting only targeted users rather than the broader user base.
Who It Impacts
This incident impacts:
- Organizations and individuals using Notepad++ versions prior to 8.8.9
- Systems that relied on the WinGUp automatic update mechanism
- Targeted environments in sectors such as:
- Government
- Telecommunications
- Financial services
- Software development and IT operations
The targeting methodology suggests intentional victim selection, consistent with advanced threat activity, rather than indiscriminate malware distribution.
How It Impacts
Infrastructure?Level Hijacking
According to the forensic analysis conducted by independent security experts and the former hosting provider, the compromise occurred at the infrastructure level, rather than through a vulnerability in the Notepad++ codebase itself. The attackers gained access to the shared hosting server, which allowed them to intercept update requests destined for notepad-plus-plus.org.
The attack specifically targeted the getDownloadUrl.php script used by the Notepad++ updater (WinGUp). By controlling this endpoint, threat actors were able to selectively redirect specific users to attacker?controlled servers hosting malicious binaries. These malicious payloads were served in place of legitimate updates, exploiting the fact that older versions of WinGUp did not strictly enforce digital certificate and signature validation for downloaded installers.
Multiple independent security researchers have assessed that this campaign was likely conducted by a Chinese state?sponsored threat actor, based on the high degree of selectivity, operational discipline, and persistence observed during the attack.
Timeline of Compromise
| Date | Event Description |
| Jun-25 | Initial Compromise: Attackers gained access to the shared hosting server. |
| 2-Sep-25 | Server Access Lost: Scheduled kernel/firmware maintenance severed direct attacker access. |
| Sept 2 – Dec 2, 2025 | Credential Persistence: Attackers retained stolen internal service credentials, allowing continued traffic redirection. |
| 10-Nov-25 | Attack Ceased (Estimated): Security experts observed a halt in active malicious redirection. |
| 2-Dec-25 | Access Terminated: Hosting provider rotated all credentials and completed security hardening. |
| 9-Dec-25 | Mitigation Released: Notepad++ v8.8.9 published with hardened update verification. |
The hosting provider confirmed that no other clients on the shared infrastructure were targeted; the attackers specifically focused on the Notepad++ domain. Following the incident, the Notepad++ project migrated to a new hosting provider with enhanced security controls.
Targeted Products
- Notepad++ for Windows
- Versions earlier than 8.8.9
- WinGUp (Notepad++ Update Mechanism)
- Versions lacking enforced certificate and signature validation
Manual downloads from the official website were not affected, as the compromise targeted the update delivery mechanism only.
Recommendations
Immediate Actions
- Upgrade immediately to Notepad++ version 8.8.9 or later
- Prefer version 8.9.1 or newer where available
- Review systems that updated Notepad++ between June and December 2025
Enterprise Security Controls
- Disable or restrict automatic updates via WinGUp in managed environments
- Monitor outbound traffic from:
- notepad++.exe
- gup.exe
- Investigate systems for:
- Unknown persistence mechanisms
- Unexpected installer execution from %TEMP%
- Signs of command?and?control traffic
Long?Term Mitigation
To prevent similar hijacking attempts, Notepad++ version 8.8.9 introduced strict update validation within WinGUp, requiring:
- A valid digital signature
- A matching and trusted certificate
If either verification fails, the update process is automatically aborted, significantly reducing the risk of update?based supply?chain attacks.
References
- https://notepad-plus-plus.org/news/hijacked-incident-info-update/
- https://thehackernews.com/2026/02/notepad-official-update-mechanism.html
- https://cybernews.com/security/state-sponsored-hackers-behind-notepad-plus-plus-hack/
- https://cybersecuritynews.com/notepad-hijacked/