Technology
- Home
- Technology
- News
Notepad++ updates got hijacked for months and could have spied for China
Users of the text and code editor Notepad++ may have unknowingly downloaded a malicious update for the app after its shared hosting servers were hijacked last year. On Monday, the app's developer, Don Ho, posted an update on the attack with more details, incl…

Published 2 months ago on Feb 7th 2026, 5:00 am
By Web Desk

Users of the text and code editor Notepad++ may have unknowingly downloaded a malicious update for the app after its shared hosting servers were hijacked last year. On Monday, the app’s developer, Don Ho, posted an update on the attack with more details, including that the hackers were “likely a Chinese state-sponsored group” and that the app’s servers were vulnerable for roughly six months from June through December 2nd, 2025.
The post explains that the hijacking occurred on the app’s unnamed, now-former hosting provider’s end, stating that “Traffic from certain targeted users was selectively redirected to attacker-controlled served malicious update manifests.” When victims were redirected, their app update could be replaced with a malicious executable that, according to independent cybersecurity expert Kevin Beaumont, may have given the hackers remote access to a victim’s keyboard.
Don Ho’s post also adds that the attack involved “highly selective targeting” in terms of the victims it redirected away from the legitimate Notepad++ website. Kevin Beaumont noted that the victims he spoke with “are [organizations] with interests in East Asia.” So, while this is a serious security vulnerability, it’s possible that the hackers were busy watching specific people instead of just anyone.
The developer did not specify when they became aware of the attack, but said that “all attacker access was definitively terminated” by December 2nd. The Notepad++ updater has been updated itself with stronger security measures to check for tampering and verify that updates are legitimate.
Notepad++ users should make sure they are on at least version 8.8.9, which addressed the vulnerabilities from the hijacking attack, and they should probably download that version directly from the Notepad++ website. Additionally, Kevin Beaumont suggested users double-check that they’re not using an unofficial version of Notepad++, keep a close eye on activity from “gup.exe,” the app’s updater, and check for a suspicious “update.exe” or “AutoUpdater.exe” file in their TEMP folder.
Notably, Don Ho, the developer of Notepad++, criticized the Chinese government in a 2019 app update. He called that version the “Free Uyghur” edition, and told The Verge at the time that his website had faced DDoS attacks in response.

Microsoft’s finally giving up on its massive Surface Hub touchscreen displays
- 15 hours ago
American musician D4vd arrested on suspicion of murdering 14-year-old girl
- 13 hours ago
Pakistani-flagged tanker exits Gulf via Hormuz with UAE crude, data shows
- 13 hours ago
National cyclist Natalaia Khan dies at 28
- 13 hours ago
Saudi Fund extends $3b deposit with State Bank of Pakistan
- 13 hours ago
Eight people killed in helicopter crash in Indonesia’s West Kalimantan, authorities say
- 13 hours ago

Big relief for public as government reduces diesel rice by Rs 32
- 7 hours ago
Pakistan urges safe passage of civilian ships through Strait of Hormuz
- 13 hours ago
Pak-Iran Interior Ministers discuss latest regional situation
- 13 hours ago
Sources: Michigan lands Illini QB decommit Lopati
- a day ago
Iran’s foreign minister says passage of vessels via Hormuz Strait is open during ceasefire
- 9 hours ago

Godzilla Minus Zero stomps through New York in first teaser trailer
- 15 hours ago
You May Like
Trending










