Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users
好的,我现在要帮用户总结这篇文章的内容,控制在100字以内。首先,我需要通读全文,抓住主要信息。 文章讲的是Notepad++的维护者发现国家资助的攻击者劫持了更新机制,将更新流量重定向到恶意服务器。攻击发生在托管提供商层面,而非软件漏洞。问题出在更新器验证下载文件的完整性和真实性的方式上,导致攻击者能截获流量并下载恶意软件。事件从2025年6月开始,持续到12月。Notepad++已迁移到新的托管商。 接下来,我要把这些要点浓缩成一句话,不超过100字。注意不要使用“这篇文章”这样的开头词。 可能的结构:Notepad++ 更新机制被国家资助的攻击者劫持,导致用户下载恶意软件。攻击发生在托管提供商层面,而非软件漏洞。事件从2025年6月开始,持续到12月。Notepad++已迁移到新的托管商。 现在检查字数是否在限制内,并确保信息准确无误。 </think> Notepad++ 更新机制遭国家资助攻击者劫持,用户被重定向至恶意服务器下载恶意软件。攻击源于托管提供商被入侵而非软件漏洞。事件始于2025年6月,持续至12月。Notepad++已迁移至新托管商以应对威胁。 2026-2-2 08:55:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Threat Intelligence / Malware

Notepad Hacked

The maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility's update mechanism to redirect update traffic to malicious servers instead.

"The attack involved [an] infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org," developer Don Ho said. "The compromise occurred at the hosting provider level rather than through vulnerabilities in Notepad++ code itself."

The exact mechanism through which this was realized is currently being investigated, Ho added.

The development comes a little over a month after Notepad++ released version 8.8.9 to address an issue that resulted in traffic from WinGUp, the Notepad++ updater, being "occasionally" redirected to malicious domains, resulting in the download of poisoned executables.

Cybersecurity

Specifically, the problem stemmed from the way the updater verified the integrity and authenticity of the downloaded update file, allowing an attacker who is able to intercept network traffic between the updater client and the update server to trick the tool into downloading a different binary instead.

It's believed this redirection was highly targeted, with traffic originating from only certain users routed to the rogue servers and fetching the malicious components. The incident is assessed to have commenced in June 2025, more than six months before it came to light.

Independent security researcher Kevin Beaumont revealed that the flaw was being exploited by threat actors in China to hijack networks and deceive targets into downloading malware. In response to the security incident, the Notepad++ website has been migrated to a new hosting provider.

"According to the former hosting provider, the shared hosting server was compromised until September 2, 2025," Ho explained. "Even after losing server access, attackers maintained credentials to internal services until December 2, 2025, which allowed them to continue redirecting Notepad++ update traffic to malicious servers."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/notepad-official-update-mechanism.html
如有侵权请联系:admin#unsafe.sh