Suspected China-state hackers used update infrastructure to deliver backdoored version.
See full article...
See full article...
No seems they were targeting specific users. Can't be sure who the users were.So everybody who updated using the auto updater between those dates are for sure compromised or no?
This traffic is supposed to be over HTTPS, however it appears you may be [able] to tamper with the traffic if you sit on the ISP level and TLS intercept.
Makes sense. If you can limit the compromised version to a small number of targeted users (rather than millions in the general public) it's less likely the hacked version will be detected quickly.No seems they were targeting specific users. Can't be sure who the users were.
The author of Notepad++ recommends downloading v8.9.1:Does this match the status for anyone that's recently done a direct download/install of v8.8.8.8 as recommended in the article?
Then you are not affected. Only those who used build-in update mechanism are at risk. So millions of people, at least in theory.I'm attempting to research this on my own, to no avail so far, but does anyone have input on whether those of us who were using ninite.com to update notepad++ would have been affected by this?
I guess it depends on how many years you are talking about:So only version after September 2025 and not before. So if you installed it not to auto update years ago it probably is ok?
No, in the blog post it states that the hosting provider ran routine kernel/system updates in September which removed the exploit being used. They weren’t aware of the hack or credentials until the NPP developer contacted them in December.The hosting provider knew about the breach in September but didn't rotate & revoke secrets until December? I guess I can see why they're the ex-provider.
I'm attempting to research this on my own, to no avail so far, but does anyone have input on whether those of us who were using ninite.com to update notepad++ would have been affected by this?
And how were the targeted users discovered? I ask, because it's fully possible that there were many other targeted users that have never realized they were compromised, unless we have some way of knowing which users' updates got intercepted.Any word on who the targeted users may have been?
https://doublepulsar.com/small-numbers-of-notepad-users-reporting-security-woes-371d7a3fd2d9And how were the targeted users discovered? I ask, because it's fully possible that there were many other targeted users that have never realized they were compromised, unless we have some way of knowing which users' updates got intercepted.
Funnily the exact reason why I've had the page open for months now, but not downloaded it yet... Didn't know how to make 100% sure this was the real deal or not!Beaumont also warned that search engines are so “rammed full” of advertisements pushing trojanized versions of Notepad++ that many users are unwittingly running them inside their networks.
I may be misremembering the details, and I can't look it up at the moment, but I recall there being a shift from a globalsign to a selfsigned cert at some point; something about the author wanting an org cert vs a personal one or something and MS not allowing org held certs? You might find the details on their forums somewhere; last time I installed it (OctoberishI just checked the properties of my v8.8.8 notepad++.exe . The digital signatures tab shows 'NOTEPAD++' with sha256 being signed with a Globalsign certificate that windows thinks is OK. However, there's also a 'Notepad++' (mixed case) entry with sha512 that appears to still be signed with a self-signed certificate.
I'm unfamiliar with having two different digital signatures with two different encryptions embedded in a binary. Does this match the status for anyone that's recently done a direct download/install of v8.8.8.8 as recommended in the article?
In my case, I did not "disable" the auto updater, but I never used it. If I saw it prompt for an update, I would close n++ and run ninite. So, as far as I know, it never actually downloaded anything. I'm not using ninite pro, I just keep a few ninite updaters lying around and run them as needed. I think I'm safe.Seems nnite pro allows disabling the built in updaters as a feature so presumably the free version still uses the built in updater and is vulnerable if you are a potential target.
Edit: seems like only a few programs can have their auto update mechanism disabled;
https://ninite.com/help/features/disableautoupdate.html
So unless I'm missing something nnite pro or not you're using notepad++ updater and thus were at risk if you were a target.
I fear this will be a lot of people's take-away, which is not good security-wise.Never update, never a problem![]()
My employer's software centre team - is that you?!?I'm not affected because I'm a lazy bastard and I've ignored the prompt to update for years!
I'm not (much of) a coder. You can prise Notepad++ from my cold, dead hands.People should just be using VS Code anyways
Proof positive: I just searched for "Notepad++" and the second result says "Notepad++ Official Website..." but the domain is .com.cn.Beaumont also warned that search engines are so “rammed full” of advertisements pushing trojanized versions of Notepad++ that many users are unwittingly running them inside their networks.

One of my personal symptoms of lazy bastard syndrome is that I still to this day haven't bothered to research and figure out what I need to do on a Windows machine to verify GPG signatures on downloads. That kind of seemed relevant going to grab 8.9.1 from the web site after reading these comments. Thankfully(?) the sha256 hashes can be found on the Github repo. Nowhere near as secure, of course, but it's what I know how to check.I'm not affected because I'm a lazy bastard and I've ignored the prompt to update for years!
What does an update do? To the non-tech user:but seriously, do we need to auto-update text editors? Seems to me that is naive to assume that constantly sucking down something new from the internet is an inevitable win, just the obviously sensible behavior.
(Or, maybe everyone else just gets really excited by the latest new text editor features?)
Most larger companies would manage software installs using Configuration Manager / Software Center (i.e. what was formerly called SCCM). This means they wouldn't be vulnerable to an auto-updater based attack, which could perhaps help mitigate concerns about this vulnerability.F*** that will get it banned at my company
A different tool for different jobs.People should just be using VS Code anyways