Skip to the content
  • Why Vertex
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Startups, Scaleups & FinTechs
    • Small & Medium Enterprises
    • Expertise in Education
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Startups, Scaleups & FinTechs
    • Small & Medium Enterprises
    • Expertise in Education
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

Notepad++ Update Hijacking: What Your Organisation Needs to Know

The popular text editor Notepad++ recently disclosed a sophisticated cyber attack that targeted its update infrastructure. This incident is a stark reminder that even the most trusted tools can be compromised through their supply chains. Between June and December 2025, malicious actors, believed to be state-sponsored, managed to intercept and redirect update traffic to deliver malicious files to unsuspecting users.

How the Hijacking Occurred

This was not a vulnerability within the Notepad++ code itself. Instead, the attack involved a compromise at the infrastructure level. The shared hosting provider used by the project was breached, allowing attackers to gain access to internal credentials.

With these credentials, the hackers selectively redirected update requests. Instead of receiving a legitimate update manifest from the official website, certain targeted users were redirected to servers controlled by the attackers. These rogue servers then delivered compromised update instructions, potentially leading to the installation of malicious software on the user’s computer.

The Targeted Nature of the Attack

According to the article (https://notepad-plus-plus.org/news/hijacked-incident-info-update/) Security experts have assessed that the threat actor involved is likely a Chinese state-sponsored group. This is evidenced by the highly selective nature of the targeting. Not every user who attempted to update Notepad++ was affected; rather, the attackers appear to have focused on specific individuals or organisations of interest.

The breach highlights a critical risk in modern computing: supply chain security. When a central update mechanism is compromised, it provides a direct pathway for attackers to reach thousands of systems simultaneously.

How the Situation Was Resolved

The developer of Notepad++ has taken several significant steps to resolve the issue and enhance future security:

  • Migration of Services: The entire website and update infrastructure have been moved to a new hosting provider with more robust security protocols.
  • Enhanced Verification: Starting with version 8.8.9, the updater tool was improved to verify both the digital certificate and the signature of the downloaded installer.
  • Signed Update Manifests: The update server now uses signed files to ensure that the instructions sent to your computer have not been tampered with.
  • Manual Update Recommendations: Users are encouraged to manually download version 8.9.1 or later from the official site to ensure they are running a clean, secure version of the application.

Protecting Your Organisation from Similar Threats

While this specific incident has been addressed, the underlying risks remain for many other software tools. To improve your security posture, consider implementing the following strategies:

  • Centralised Software Management: Use administrative tools to control which software versions are installed across your organisation, rather than allowing individual users to run updates manually.
  • Infrastructure Audits: Regularly review the security practices of your third-party hosting and service providers to ensure they meet modern standards.
  • Endpoint Monitoring: Consider deploying advanced monitoring solutions that can detect unusual behaviour, such as a trusted application attempting to connect to an unknown or suspicious domain.
  • Employee Awareness: Ensure your team understands the importance of verifying the source of software downloads and being cautious of unexpected update prompts.

Navigating these complex infrastructure risks can be a significant challenge for any business. If you are concerned about your software supply chain or wish to review your current security measures, contact the expert team at Vertex. We provide tailored solutions and strategic guidance to help protect your organisation from evolving global threats.

CATEGORIES

Uncategorised

TAGS

Cybersecurity - Hijacking - Notepad++ - State-sponsored hackers - Supply chain attack

SHARE

SUBSCRIBE

PrevPreviousWhite House Rescinds SBOM Mandates: A Strategic Shift in Software Supply Chain Security
NextAI Platform Breached Exposing Chats: Why Security Cannot Be an Afterthought in Artificial Intelligence DevelopmentNext

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
  • 1300 229 237
  • Suite 10 30 Atchison Street St Leonards NSW 2065
  • 477 Pitt Street Sydney NSW 2000
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2026 Vertex Technologies Pty Ltd (ABN: 67 611 787 029). Vertex is a private company (beneficially owned by the Boyd Family Trust).

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.