Nation-State Hackers Hijacked Notepad++ Updates via Hosting Infrastructure Exploit

Nation-State Hackers Hijacked Notepad++ Updates via Hosting Infrastructure Exploit

Nation-state hackers have successfully compromised the update system of Notepad++, redirecting user traffic through an exploited hosting infrastructure. This sophisticated attack did not stem from vulnerabilities within Notepad++ itself, but rather involved the manipulation of hosting provider services.

Details of the Attack

The attack was first identified in June 2025, and it is believed to be linked to a state-sponsored group, potentially from China, due to its selective targeting of specific users. Security experts report that the attackers compromised a shared hosting server and maintained access until December 2, 2025.

  • Initial Compromise: June 2025
  • End of Attack: December 2, 2025
  • Connection to Nation-State Hackers: Likely affiliated with a Chinese group

Technical Aspects of the Exploit

The compromise involved redirecting update traffic meant for notepad-plus-plus.org to malicious servers, allowing the attackers to deliver harmful updates. Notably, the attack did not exploit any flaws in the Notepad++ codebase but instead leveraged vulnerabilities in the hosting provider’s infrastructure.

Reports specify that attackers utilized stolen internal credentials to further gain control over the redirection of update traffic. Even after the hosting provider moved affected users to a secure server and implemented fixes, the assessment indicated a potential for continued unauthorized access until early December.

Remedial Actions Taken

In response to the incident, the hosting provider transitioned all affected customers to a different server, addressed the exploited vulnerabilities, and changed all potentially compromised credentials. Following these security enhancements, system logs were reviewed, confirming that there was no remaining attacker access.

Updates and Future Security Measures

To bolster security, Notepad++ maintainers have made significant changes to their update verification processes. The upcoming release, version 8.9.2, will feature:

  • Enhanced verification of installer certificates and signatures
  • Signed update data
  • Stricter security checks

The maintainers expressed their apologies to users affected by this breach and emphasized their commitment to safeguarding the integrity of Notepad++. They have since migrated the Notepad++ website to a more secure hosting provider to mitigate future risks.

Conclusion

This incident underlines the vulnerabilities that can arise at the hosting provider level, showcasing a significant challenge for software maintainers. The Notepad++ team and their providers are taking steps to enhance security moving forward, aiming to prevent similar attacks in the future.