Notepad++ hijacked by suspected state-sponsored hackers
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容。 文章讲的是Notepad++的软件更新机制被中国国家支持的黑客劫持了。他们通过基础设施层级的攻击,将部分用户的更新请求重定向到恶意服务器。攻击者没有利用源代码漏洞,而是通过劫持网络流量实现的。这种攻击难以检测,且影响范围有限。事件从2025年6月持续到12月,开发者已采取措施修复问题,并建议用户升级软件。 接下来,我需要将这些信息浓缩成100字以内的摘要。要确保涵盖主要事件、攻击方式、影响范围以及应对措施。 可能的结构是:Notepad++更新机制被中国黑客劫持,通过基础设施重定向用户到恶意服务器,未利用代码漏洞,影响有限且难以检测,已修复并建议升级。 这样既简洁又全面。 </think> Notepad++更新机制遭中国国家支持的黑客劫持,部分用户被重定向至恶意服务器。攻击未利用代码漏洞,而是通过基础设施层级实现。此类"中间路径"攻击难检测且影响有限。事件已修复并建议用户升级以防范风险。 2026-2-2 14:16:21 Author: therecord.media(查看原文) 阅读量:0 收藏

A software update mechanism for the popular text editor Notepad++ was hijacked by suspected Chinese state-sponsored hackers, allowing them to silently redirect some users to malicious update servers, the project’s developers announced on Monday.

In a security update posted on the project’s website, the development team said the attack did not exploit a flaw in the editor’s source code itself. Instead, the compromise occurred at the infrastructure level, involving systems used to deliver software updates.

The attackers were able to “intercept and redirect update traffic destined for notepad-plus-plus.org” stated the team, adding that the “exact technical mechanism remains under investigation.”

Notepad++, a free and open-source editor widely used by tech workers, has millions of users worldwide. The incident underscores ongoing concerns about the security of software supply chains, even for well-established open-source projects.

Unlike many supply-chain attacks, which involve tampering with source code repositories, the Notepad++ incident relied on redirecting network traffic after it left a user’s computer but before it reached the legitimate update server.

Such “on-path” attacks can be difficult to detect and may leave limited forensic evidence, particularly when they affect only a narrow set of users.

Similar tactics have been observed in previous incidents. In 2018, hackers compromised the update delivery infrastructure for ASUS in what researchers called the ShadowHammer campaign. As cybersecurity firm SentinelOne noted, although the malicious updates were distributed to potentially hundreds of thousands of systems, the attackers appeared interested in only a few hundred specific targets.

The Notepad++ developers said their incident followed a similar pattern, with update traffic “selectively redirected” for certain users rather than deployed broadly. The team emphasized the campaign was not a mass attack and did not affect all users, though it did not disclose how many systems were ultimately targeted.

The hijacking began in June 2025 and continued until December, according to the developers. They cited assessments by multiple independent security researchers who concluded the activity was likely linked to a Chinese state-sponsored threat actor, though the researchers and their methods were not publicly identified.

Such attributions are typically based on infrastructure reuse, targeting behavior and operational characteristics rather than direct evidence, and remain difficult to verify conclusively.

The developers said the project has since moved its update infrastructure to a new hosting provider and introduced additional security controls in version 8.9.1 to harden the update mechanism. Users have been urged to upgrade as a precaution.

“I deeply apologize to all users affected by this hijacking,” the author of the security notice wrote.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Alexander Martin

Alexander Martin

is the UK Editor for Recorded Future News. He was previously a technology reporter for Sky News and is also a fellow at the European Cyber Conflict Research Initiative.


文章来源: https://therecord.media/popular-text-editor-hijacked-by-suspected-state-sponsored-hackers
如有侵权请联系:admin#unsafe.sh