Popular text editor Notepad++ was hacked to drop malware

By
Follow google news

Chinese state-sponsored group redirected some users' traffic.

Notepad++, a free open source text and code editor for the Windows operating system, suffered an "infrastructure-level compromise" last year by threat actors seeking to deliver malware to selected users.

Popular text editor Notepad++ was hacked to drop malware

A post-mortem of the incident which started in June 2025, and which was reported to Notepad++ by security researchers, suggested the shared hosting server for the text editor was compromised until December 2 last year.

This was in conjunction with a vulnerability in older versions of Notepad++ discovered in 2025.

The compromise officially came to light last year, when the Notepad++ developer Don Ho announced the release of version 8.8.9 which contained a fix for a traffic hijacking vulnerability.

"... Traffic from WinGUp (the Notepad++ updater) was occasionally redirected to malicious servers, resulting in the download of compromised executables," Ho wrote.

A weakness in the way WinGUP validated the integrity and authenticity of the update file allowed an attacker to intercept network traffic between the downloaded code and the Notepad++ infrastructure.

In turn this could be abused by an attacker to make the updater to download and run a malicious binary file, instead of the expected, legitimate Notepad++ one.

Unnamed Chinese state-sponsored threat actors selectively targeting specific Notepad++ users are thought by security researchers to be behind the attack.

Notepad++ has now moved to new hosting provider with "significantly stronger security practices" so as to prevent a repeat of the compromise.

Better certificate and signature verification has been added to the WinGUP updater to ensure the integrity of the downloaded Notepad++ installer.

Notepad++ version 8.9.1 contains the security fixes, and Ho suggested updating the text editor manually as well.

Update Security vendor Rapid7 has published its research into what it said was a "sophisticated compromise of the infrastructure hosting Notepad++".

Rapid7 attributed the attack to a Chinese advanced persistent threat (APT) group code named Lotus Blossom, which has been active since 2009, based on technical aspects from earlier activity.

Lotus Blossom sought to deliver an undocumented backdoor in the attack, named Chrysalis, but Rapid7 said it has no evidence that bulk data exfiltration took place, only selective access.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Australia's big end of town is paying ransomware groups

Australia's big end of town is paying ransomware groups

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Seven years' prison for Australian who sold zero-days to Russia

Seven years' prison for Australian who sold zero-days to Russia

AI can unmask online users for just a few dollars each

AI can unmask online users for just a few dollars each

Log In

  |  Forgot your password?