Technology
- Home
- Technology
- News
Notepad++ updates got hijacked for months and could have spied for China
Users of the text and code editor Notepad++ may have unknowingly downloaded a malicious update for the app after its shared hosting servers were hijacked last year. On Monday, the app's developer, Don Ho, posted an update on the attack with more details, incl…

Published 2 months ago on Feb 7th 2026, 5:00 am
By Web Desk

Users of the text and code editor Notepad++ may have unknowingly downloaded a malicious update for the app after its shared hosting servers were hijacked last year. On Monday, the app’s developer, Don Ho, posted an update on the attack with more details, including that the hackers were “likely a Chinese state-sponsored group” and that the app’s servers were vulnerable for roughly six months from June through December 2nd, 2025.
The post explains that the hijacking occurred on the app’s unnamed, now-former hosting provider’s end, stating that “Traffic from certain targeted users was selectively redirected to attacker-controlled served malicious update manifests.” When victims were redirected, their app update could be replaced with a malicious executable that, according to independent cybersecurity expert Kevin Beaumont, may have given the hackers remote access to a victim’s keyboard.
Don Ho’s post also adds that the attack involved “highly selective targeting” in terms of the victims it redirected away from the legitimate Notepad++ website. Kevin Beaumont noted that the victims he spoke with “are [organizations] with interests in East Asia.” So, while this is a serious security vulnerability, it’s possible that the hackers were busy watching specific people instead of just anyone.
The developer did not specify when they became aware of the attack, but said that “all attacker access was definitively terminated” by December 2nd. The Notepad++ updater has been updated itself with stronger security measures to check for tampering and verify that updates are legitimate.
Notepad++ users should make sure they are on at least version 8.8.9, which addressed the vulnerabilities from the hijacking attack, and they should probably download that version directly from the Notepad++ website. Additionally, Kevin Beaumont suggested users double-check that they’re not using an unofficial version of Notepad++, keep a close eye on activity from “gup.exe,” the app’s updater, and check for a suspicious “update.exe” or “AutoUpdater.exe” file in their TEMP folder.
Notably, Don Ho, the developer of Notepad++, criticized the Chinese government in a 2019 app update. He called that version the “Free Uyghur” edition, and told The Verge at the time that his website had faced DDoS attacks in response.

Nvidia CEO Jensen Huang says ‘I think we’ve achieved AGI’
- 18 hours ago
Pakistan has conveyed US proposal; Turkey or Pakistan could host talks, senior Iranian official says
- a day ago

Gold prices continue to surge in Pakistan, global markets
- a day ago

What baseball’s “robot umpires” tell us about the future of work
- 16 hours ago
Trump urges Iran to make a deal or US will ‘keep blowing them away’
- 3 hours ago
Hajj flights under govt scheme to begin from April 18
- a day ago

PM Shehbaz reiterates Pakistan's solidarity, support for KSA
- a day ago
Fire at Kuwait airport after drones hit fuel tank: aviation agency
- a day ago
Barrick to delay Pakistan copper-gold project amid Middle East conflict, FT reports
- 5 hours ago

Pakistan to play proactive role in regional de-escalation: FO
- 2 hours ago

Two of my favorite color e-book readers are the cheapest they’ve been in months
- a day ago
PIA to resume direct Islamabad, Lahore–London flights from March 29–30: Asif
- 6 hours ago
You May Like
Trending






