Notepad++ updater was compromised for 6 months in supply-chain attack

RuntimeFire

Smack-Fu Master, in training
98
Would love to see a breakdown of the timeline. It seems a long time to go unnoticed and even worse how they maintained access for so long after noticing.

Anyone know who the host was so I can avoid them?

Edit: Looks like it was hostinger which tracks given my history with them too...
 
Last edited:
Upvote
106 (106 / 0)

willdude

Ars Scholae Palatinae
762
This traffic is supposed to be over HTTPS, however it appears you may be [able] to tamper with the traffic if you sit on the ISP level and TLS intercept.

Boy I sure hope my ISP can't intercept and modify my TLS traffic!

To be honest I don't really understand this explanation of the compromise. First they're talking about the hosting provider being compromised, then they're talking about HTTP traffic being intercepted.
 
Upvote
124 (124 / 0)
No seems they were targeting specific users. Can't be sure who the users were.
Makes sense. If you can limit the compromised version to a small number of targeted users (rather than millions in the general public) it's less likely the hacked version will be detected quickly.
 
Upvote
118 (118 / 0)

Billiam29

Ars Scholae Palatinae
818
I just checked the properties of my v8.8.8 notepad++.exe . The digital signatures tab shows 'NOTEPAD++' with sha256 being signed with a Globalsign certificate that windows thinks is OK. However, there's also a 'Notepad++' (mixed case) entry with sha512 that appears to still be signed with a self-signed certificate.

I'm unfamiliar with having two different digital signatures with two different encryptions embedded in a binary. Does this match the status for anyone that's recently done a direct download/install of v8.8.8.8 as recommended in the article?
 
Upvote
85 (85 / 0)
Does this match the status for anyone that's recently done a direct download/install of v8.8.8.8 as recommended in the article?
The author of Notepad++ recommends downloading v8.9.1:

Screenshot 2026-02-02 at 3.53.38 PM.png


SOURCE
 
Upvote
102 (102 / 0)
I'm attempting to research this on my own, to no avail so far, but does anyone have input on whether those of us who were using ninite.com to update notepad++ would have been affected by this?
Then you are not affected. Only those who used build-in update mechanism are at risk. So millions of people, at least in theory.
 
Upvote
34 (34 / 0)
Upvote
25 (25 / 0)

jg2

Seniorius Lurkius
43
The hosting provider knew about the breach in September but didn't rotate & revoke secrets until December? I guess I can see why they're the ex-provider.
No, in the blog post it states that the hosting provider ran routine kernel/system updates in September which removed the exploit being used. They weren’t aware of the hack or credentials until the NPP developer contacted them in December.
 
Upvote
77 (77 / 0)

RuntimeFire

Smack-Fu Master, in training
98
I'm attempting to research this on my own, to no avail so far, but does anyone have input on whether those of us who were using ninite.com to update notepad++ would have been affected by this?
Seems nnite pro allows disabling the built in updaters as a feature so presumably the free version still uses the built in updater and is vulnerable if you are a potential target.

Edit: seems like only a few programs can have their auto update mechanism disabled;
https://ninite.com/help/features/disableautoupdate.html

So unless I'm missing something nnite pro or not you're using notepad++ updater and thus were at risk if you were a target.
 
Last edited:
Upvote
9 (9 / 0)

adespoton

Ars Legatus Legionis
10,709
Any word on who the targeted users may have been?
And how were the targeted users discovered? I ask, because it's fully possible that there were many other targeted users that have never realized they were compromised, unless we have some way of knowing which users' updates got intercepted.
 
Upvote
36 (36 / 0)

RuntimeFire

Smack-Fu Master, in training
98
And how were the targeted users discovered? I ask, because it's fully possible that there were many other targeted users that have never realized they were compromised, unless we have some way of knowing which users' updates got intercepted.
https://doublepulsar.com/small-numbers-of-notepad-users-reporting-security-woes-371d7a3fd2d9
There's a list of what to watch out for by the guy who was told about it.
Gist of it seems to be making sure gup.exe only contacted the official domains and github, and that it didn't spawn any processes.
 
Upvote
25 (25 / 0)

Kenjitsuka

Ars Scholae Palatinae
1,218
Beaumont also warned that search engines are so “rammed full” of advertisements pushing trojanized versions of Notepad++ that many users are unwittingly running them inside their networks.
Funnily the exact reason why I've had the page open for months now, but not downloaded it yet... Didn't know how to make 100% sure this was the real deal or not! :(
 
Upvote
7 (8 / -1)
Post content hidden for low score. Show…

Chito

Ars Praefectus
4,081
Subscriptor++
I just checked the properties of my v8.8.8 notepad++.exe . The digital signatures tab shows 'NOTEPAD++' with sha256 being signed with a Globalsign certificate that windows thinks is OK. However, there's also a 'Notepad++' (mixed case) entry with sha512 that appears to still be signed with a self-signed certificate.

I'm unfamiliar with having two different digital signatures with two different encryptions embedded in a binary. Does this match the status for anyone that's recently done a direct download/install of v8.8.8.8 as recommended in the article?
I may be misremembering the details, and I can't look it up at the moment, but I recall there being a shift from a globalsign to a selfsigned cert at some point; something about the author wanting an org cert vs a personal one or something and MS not allowing org held certs? You might find the details on their forums somewhere; last time I installed it (Octoberish 😅) I did some research as I wasn't getting a high-confidence result from the install popup. I've since wiped that PC...
 
Upvote
10 (11 / -1)

Nelendo

Seniorius Lurkius
23
Subscriptor++
Seems nnite pro allows disabling the built in updaters as a feature so presumably the free version still uses the built in updater and is vulnerable if you are a potential target.

Edit: seems like only a few programs can have their auto update mechanism disabled;
https://ninite.com/help/features/disableautoupdate.html

So unless I'm missing something nnite pro or not you're using notepad++ updater and thus were at risk if you were a target.
In my case, I did not "disable" the auto updater, but I never used it. If I saw it prompt for an update, I would close n++ and run ninite. So, as far as I know, it never actually downloaded anything. I'm not using ninite pro, I just keep a few ninite updaters lying around and run them as needed. I think I'm safe.
 
Upvote
8 (8 / 0)

Anonymous Chicken

Ars Tribunus Militum
1,925
Subscriptor
I see the two posts who mentioned not updating npp got downvoted, but seriously, do we need to auto-update text editors? Seems to me that is naive to assume that constantly sucking down something new from the internet is an inevitable win, just the obviously sensible behavior.

(Or, maybe everyone else just gets really excited by the latest new text editor features?)
 
Upvote
48 (57 / -9)
Post content hidden for low score. Show…

VideoGameTech

Ars Tribunus Militum
2,092
Subscriptor
Beaumont also warned that search engines are so “rammed full” of advertisements pushing trojanized versions of Notepad++ that many users are unwittingly running them inside their networks.
Proof positive: I just searched for "Notepad++" and the second result says "Notepad++ Official Website..." but the domain is .com.cn. :\
 
Upvote
70 (71 / -1)

Billiam29

Ars Scholae Palatinae
818
I'm not affected because I'm a lazy bastard and I've ignored the prompt to update for years!
One of my personal symptoms of lazy bastard syndrome is that I still to this day haven't bothered to research and figure out what I need to do on a Windows machine to verify GPG signatures on downloads. That kind of seemed relevant going to grab 8.9.1 from the web site after reading these comments. Thankfully(?) the sha256 hashes can be found on the Github repo. Nowhere near as secure, of course, but it's what I know how to check.
 
Upvote
20 (20 / 0)

SubWoofer2

Ars Tribunus Militum
2,592
but seriously, do we need to auto-update text editors? Seems to me that is naive to assume that constantly sucking down something new from the internet is an inevitable win, just the obviously sensible behavior.

(Or, maybe everyone else just gets really excited by the latest new text editor features?)
What does an update do? To the non-tech user:
  • it fixes invisible stuff that is filed under "magic happens" and stops naughty magic happening
  • it adds new things that range from crap to cruft to "I needed that" and so is often a journey on the enshittification pathway with occasional serendipity, like playing a slot machine
  • it adds excuses to monetise.

For small software that is loaf-of-bread "it ain't broke so don't fix it" the answer is often #s 2 and 3. So why would you want to update (the unsavvy user asks)?

You wouldn't believe the pain I have felt, trying to apply the original Snipping Tool to bind to Windows 11. My key workflows are stuffed. A great tool lies writhing dying in the dust. And I use Notepad.
 
Upvote
4 (13 / -9)

Marlor_AU

Ars Tribunus Angusticlavius
7,706
Subscriptor
F*** that will get it banned at my company
Most larger companies would manage software installs using Configuration Manager / Software Center (i.e. what was formerly called SCCM). This means they wouldn't be vulnerable to an auto-updater based attack, which could perhaps help mitigate concerns about this vulnerability.

That said, there seem to be several layers of issues here (at least prior to 8.8.8), so I'd imagine most cybersecurity departments will be keeping a close eye on Notepad++ in the immediate future.
 
Upvote
18 (18 / 0)