Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • Today’s NYT Connections: Sports Edition Hints, Answers for Feb. 12 #507
    • Not All RecSys Problems Are Created Equal
    • Steer-by-wire tech, Range Rover looks
    • Cut the cupcakes: how to avoid corporate takeover of International Women’s Day
    • ‘Heated Rivalry’ Is Bringing New Fans to Hockey. Does the Sport Deserve Them?
    • Viral post sparks debate over Kroger gambling machines in Georgia
    • Remember James Van Der Beek by Streaming Dawson’s Creek and His Other Roles
    • AI Companions Are Growing more Popular
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Thursday, February 12
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»Technology»Notepad++ Users, You May Have Been Hacked by China
    Technology

    Notepad++ Users, You May Have Been Hacked by China

    Editor Times FeaturedBy Editor Times FeaturedFebruary 5, 2026No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    Infrastructure delivering updates for Notepad++—a extensively used textual content editor for Home windows—was compromised for six months by suspected China-state hackers who used their management to ship backdoored variations of the app to pick out targets, builders mentioned Monday.

    “I deeply apologize to all customers affected by this hijacking,” the creator of a post printed to the official notepad-plus-plus.org website wrote Monday. The publish mentioned that the assault started final June with an “infrastructure-level compromise that allowed malicious actors to intercept and redirect replace site visitors destined for notepad-plus-plus.org.” The attackers, whom a number of investigators tied to the Chinese language authorities, then selectively redirected sure focused customers to malicious replace servers the place they obtained backdoored updates. Notepad++ didn’t regain management of its infrastructure till December.

    The attackers used their entry to put in a never-before-seen payload that has been dubbed Chrysalis. Safety agency Fast 7 described it as a “customized, feature-rich backdoor.”

    “Its big range of capabilities signifies it’s a subtle and everlasting instrument, not a easy throwaway utility,” firm researchers mentioned.

    Fingers-On Keyboard Hacking

    Notepad++ mentioned that officers with the unnamed supplier internet hosting the replace infrastructure consulted with incident responders and located that it remained compromised till September 2. Even then, the attackers maintained credentials to the interior providers till December 2, a functionality that allowed them to proceed redirecting chosen replace site visitors to malicious servers. The risk actor “particularly focused Notepad++ area with the purpose of exploiting inadequate replace verification controls that existed in older variations of Notepad++.” Occasion logs point out that the hackers tried to re-exploit one of many weaknesses after it was fastened however that the try failed.

    In accordance with impartial researcher Kevin Beaumont, three organizations told him that units inside their networks that had Notepad++ put in skilled “safety incidents” that “resulted in hands-on keyboard risk actors,” which means the hackers have been capable of take direct management utilizing a web-based interface. All three of the organizations, Beaumont mentioned, have pursuits in East Asia.

    The researcher defined that his suspicions have been aroused when Notepad++ model 8.8.8 launched bug fixes in mid-November to “harden the Notepad++ Updater from being hijacked to ship one thing … not Notepad++.”

    The replace made modifications to a bespoke Notepad++ updater often known as GUP, or alternatively, WinGUP. The gup.exe executable accountable experiences the model in use to https://notepad-plus-plus.org/replace/getDownloadUrl.php after which retrieves a URL for the replace from a file named gup.xml. The file specified within the URL is downloaded to the %TEMP% listing of the gadget after which executed.

    Beaumont wrote:

    For those who can intercept and alter this site visitors, you may redirect the obtain to any location it seems by altering the URL within the property.

    This site visitors is meant to be over HTTPS, nevertheless it seems you could be [able] to tamper with the site visitors should you sit on the ISP stage and TLS intercept. In earlier variations of Notepad++, the site visitors was simply over HTTP.

    The downloads themselves are signed—nevertheless some earlier variations of Notepad++ used a self signed root cert, which is on Github. With 8.8.7, the prior launch, this was reverted to GlobalSign. Successfully, there’s a scenario the place the obtain isn’t robustly checked for tampering.

    As a result of site visitors to notepad-plus-plus.org is pretty uncommon, it might be doable to take a seat contained in the ISP chain and redirect to a special obtain. To do that at any form of scale requires a number of sources.

    Beaumont printed his working concept in December, two months to the day previous to Monday’s advisory by Notepad++. Mixed with the small print from Notepad++, it’s now clear that the speculation was spot on.

    Beaumont additionally warned that search engines like google and yahoo are so “rammed full” of ads pushing trojanized variations of Notepad++ that many customers are unwittingly operating them inside their networks. A rash of malicious Notepad++ extensions solely compounds the danger.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    ‘Heated Rivalry’ Is Bringing New Fans to Hockey. Does the Sport Deserve Them?

    February 12, 2026

    Study of Buddhist Monks Finds Meditation Alters Brain Activity

    February 12, 2026

    ICE Is Crashing the US Court System in Minnesota

    February 11, 2026

    Jeffrey Epstein Advised an Elon Musk Associate on Taking Tesla Private

    February 11, 2026

    How to Set Up an Apple Watch for Your Kids (2026)

    February 11, 2026

    9 Best Cheap Laptops (2026), Tested and Reviewed

    February 11, 2026
    Leave A Reply Cancel Reply

    Editors Picks

    Today’s NYT Connections: Sports Edition Hints, Answers for Feb. 12 #507

    February 12, 2026

    Not All RecSys Problems Are Created Equal

    February 12, 2026

    Steer-by-wire tech, Range Rover looks

    February 12, 2026

    Cut the cupcakes: how to avoid corporate takeover of International Women’s Day

    February 12, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    How an AI-written book shows why the tech ‘terrifies’ creatives

    February 1, 2025

    AWS CEO Matt Garman Doesn’t Think AI Should Replace Junior Devs

    December 16, 2025

    Google DeepMind has a new way to look inside an AI’s “mind”

    November 20, 2024
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.