Technology
- Home
- Technology
- News
Notepad++ updates got hijacked for months and could have spied for China
Users of the text and code editor Notepad++ may have unknowingly downloaded a malicious update for the app after its shared hosting servers were hijacked last year. On Monday, the app's developer, Don Ho, posted an update on the attack with more details, incl…

Published ایک ماہ قبل on فروری 7 2026، 5:00 صبح
By Web Desk

Users of the text and code editor Notepad++ may have unknowingly downloaded a malicious update for the app after its shared hosting servers were hijacked last year. On Monday, the app’s developer, Don Ho, posted an update on the attack with more details, including that the hackers were “likely a Chinese state-sponsored group” and that the app’s servers were vulnerable for roughly six months from June through December 2nd, 2025.
The post explains that the hijacking occurred on the app’s unnamed, now-former hosting provider’s end, stating that “Traffic from certain targeted users was selectively redirected to attacker-controlled served malicious update manifests.” When victims were redirected, their app update could be replaced with a malicious executable that, according to independent cybersecurity expert Kevin Beaumont, may have given the hackers remote access to a victim’s keyboard.
Don Ho’s post also adds that the attack involved “highly selective targeting” in terms of the victims it redirected away from the legitimate Notepad++ website. Kevin Beaumont noted that the victims he spoke with “are [organizations] with interests in East Asia.” So, while this is a serious security vulnerability, it’s possible that the hackers were busy watching specific people instead of just anyone.
The developer did not specify when they became aware of the attack, but said that “all attacker access was definitively terminated” by December 2nd. The Notepad++ updater has been updated itself with stronger security measures to check for tampering and verify that updates are legitimate.
Notepad++ users should make sure they are on at least version 8.8.9, which addressed the vulnerabilities from the hijacking attack, and they should probably download that version directly from the Notepad++ website. Additionally, Kevin Beaumont suggested users double-check that they’re not using an unofficial version of Notepad++, keep a close eye on activity from “gup.exe,” the app’s updater, and check for a suspicious “update.exe” or “AutoUpdater.exe” file in their TEMP folder.
Notably, Don Ho, the developer of Notepad++, criticized the Chinese government in a 2019 app update. He called that version the “Free Uyghur” edition, and told The Verge at the time that his website had faced DDoS attacks in response.
New Zealand beat South Africa to reach T20 World Cup final
- 14 hours ago

The Supreme Court appears likely to let stoners own guns
- a day ago

The AI industry’s civil war
- 4 hours ago

PM takes parliamentary leaders into confidence regarding Pak-Afghan situation
- 20 hours ago
UCL talking points: Madrid, PSG or Italian football -- who is worse off?
- 5 hours ago
Iran Guards say launched more than 40 missiles at US, Israeli targets
- 19 hours ago

Use of Afghan soil against Pakistan unacceptable: CDF
- 7 hours ago

Jeffrey Epstein saw promise in Bitcoin — and its far-right supporters
- 21 hours ago

The Galaxy S26 is a photography nightmare
- 21 hours ago

The Supreme Court’s Republicans just seized the most dangerous power in constitutional law
- 4 hours ago
Iran postpones state funeral for Khamenei: state TV
- 17 hours ago

Do you need to know who you’d be without antidepressants?
- a day ago
You May Like
Trending









