Technology
- Home
- Technology
- News
Notepad++ updates got hijacked for months and could have spied for China
Users of the text and code editor Notepad++ may have unknowingly downloaded a malicious update for the app after its shared hosting servers were hijacked last year. On Monday, the app's developer, Don Ho, posted an update on the attack with more details, incl…

Published 2 months ago on Feb 7th 2026, 5:00 am
By Web Desk

Users of the text and code editor Notepad++ may have unknowingly downloaded a malicious update for the app after its shared hosting servers were hijacked last year. On Monday, the app’s developer, Don Ho, posted an update on the attack with more details, including that the hackers were “likely a Chinese state-sponsored group” and that the app’s servers were vulnerable for roughly six months from June through December 2nd, 2025.
The post explains that the hijacking occurred on the app’s unnamed, now-former hosting provider’s end, stating that “Traffic from certain targeted users was selectively redirected to attacker-controlled served malicious update manifests.” When victims were redirected, their app update could be replaced with a malicious executable that, according to independent cybersecurity expert Kevin Beaumont, may have given the hackers remote access to a victim’s keyboard.
Don Ho’s post also adds that the attack involved “highly selective targeting” in terms of the victims it redirected away from the legitimate Notepad++ website. Kevin Beaumont noted that the victims he spoke with “are [organizations] with interests in East Asia.” So, while this is a serious security vulnerability, it’s possible that the hackers were busy watching specific people instead of just anyone.
The developer did not specify when they became aware of the attack, but said that “all attacker access was definitively terminated” by December 2nd. The Notepad++ updater has been updated itself with stronger security measures to check for tampering and verify that updates are legitimate.
Notepad++ users should make sure they are on at least version 8.8.9, which addressed the vulnerabilities from the hijacking attack, and they should probably download that version directly from the Notepad++ website. Additionally, Kevin Beaumont suggested users double-check that they’re not using an unofficial version of Notepad++, keep a close eye on activity from “gup.exe,” the app’s updater, and check for a suspicious “update.exe” or “AutoUpdater.exe” file in their TEMP folder.
Notably, Don Ho, the developer of Notepad++, criticized the Chinese government in a 2019 app update. He called that version the “Free Uyghur” edition, and told The Verge at the time that his website had faced DDoS attacks in response.

Xbox Game Pass ‘has become too expensive,’ says Microsoft’s new gaming chief in leaked memo
- 2 hours ago

CB Moore: Irish on 'revenge tour' after CFP snub
- 37 minutes ago
Franklin vows less CEO-like style with Hokies
- 36 minutes ago
PM Shehbaz departs for Saudi Arabia
- 15 hours ago
France and Liverpool forward Ekitike suffers blow to World Cup hopes
- 15 hours ago
Erdogan says Turkiye working to extend Iran ceasefire, continue talks
- 14 hours ago

SwitchBot’s button-pressing robot is now available with a rechargeable battery
- 2 hours ago

Watkins delivers halftime wakeup call in Villa win
- 37 minutes ago

Gold surges in Pakistan, global markets
- 15 hours ago

Bloodborne is being turned into an R-rated animated film
- 2 hours ago
Virginia's Elliott agrees to extension through 2030
- 36 minutes ago
Tom Cruise touts ‘wild’ dark comedy ‘Digger’ to theater owners
- 15 hours ago
You May Like
Trending






