Technology
- Home
- Technology
- News
Notepad++ updates got hijacked for months and could have spied for China
Users of the text and code editor Notepad++ may have unknowingly downloaded a malicious update for the app after its shared hosting servers were hijacked last year. On Monday, the app's developer, Don Ho, posted an update on the attack with more details, incl…

Published 2 hours ago on Feb 7th 2026, 5:00 am
By Web Desk

Users of the text and code editor Notepad++ may have unknowingly downloaded a malicious update for the app after its shared hosting servers were hijacked last year. On Monday, the app’s developer, Don Ho, posted an update on the attack with more details, including that the hackers were “likely a Chinese state-sponsored group” and that the app’s servers were vulnerable for roughly six months from June through December 2nd, 2025.
The post explains that the hijacking occurred on the app’s unnamed, now-former hosting provider’s end, stating that “Traffic from certain targeted users was selectively redirected to attacker-controlled served malicious update manifests.” When victims were redirected, their app update could be replaced with a malicious executable that, according to independent cybersecurity expert Kevin Beaumont, may have given the hackers remote access to a victim’s keyboard.
Don Ho’s post also adds that the attack involved “highly selective targeting” in terms of the victims it redirected away from the legitimate Notepad++ website. Kevin Beaumont noted that the victims he spoke with “are [organizations] with interests in East Asia.” So, while this is a serious security vulnerability, it’s possible that the hackers were busy watching specific people instead of just anyone.
The developer did not specify when they became aware of the attack, but said that “all attacker access was definitively terminated” by December 2nd. The Notepad++ updater has been updated itself with stronger security measures to check for tampering and verify that updates are legitimate.
Notepad++ users should make sure they are on at least version 8.8.9, which addressed the vulnerabilities from the hijacking attack, and they should probably download that version directly from the Notepad++ website. Additionally, Kevin Beaumont suggested users double-check that they’re not using an unofficial version of Notepad++, keep a close eye on activity from “gup.exe,” the app’s updater, and check for a suspicious “update.exe” or “AutoUpdater.exe” file in their TEMP folder.
Notably, Don Ho, the developer of Notepad++, criticized the Chinese government in a 2019 app update. He called that version the “Free Uyghur” edition, and told The Verge at the time that his website had faced DDoS attacks in response.

31 martyred, 169 injured in Islamabad suicide blast
- 12 hours ago

PM Shehbaz invites Uzbek firms to invest in Pakistan
- 11 hours ago
Mertens, Zhang win Aussie women's doubles title
- 37 minutes ago
Harrison, Skupski win Aussie Open men's doubles
- 38 minutes ago

The quiet reason why Trump is losing Gen Z
- a day ago

Humans are infiltrating the Reddit for AI bots
- 2 hours ago

Pakistan committed to boost ties with Uzbekistan in diverse fields: President
- 11 hours ago
Follow live: Sabalenka, Rybakina set to clash in blockbuster Australian Open final
- 37 minutes ago
Hamlin reinjured in fall searching fire wreckage
- 37 minutes ago

Security forces kill 24 Indian backed terrorists in Khyber Pakhtunkhwa operations
- 18 hours ago

Aluminium: Why Google’s Android for PC launch may be messy and controversial
- a day ago
Ko and Woad share lead in LPGA Tour's opener
- 38 minutes ago
You May Like
Trending










