FREE MEETING: KEY TRENDS AND RISKS IN NFT GAMES– REGISTER

  • Blog
  • About us
  • Contact Us
  • Newsletter
Reading: Breaking: Notepad++ Update Hijacked by State Hackers
Share
HTW Logo Daymode HTW Logo Nightmode
  • BOOKMARKS
  • AI
  • Computing
  • Mobile
  • Gaming
    • NYT Games
    • Roblox Codes
    • GTA
  • How-To
  • Entertainment
    • Amazon Prime
    • Netflix
  • Gadget
  • News
Reading: Breaking: Notepad++ Update Hijacked by State Hackers
Share
Font ResizerAa
HashTechWaveHashTechWave
Search
  • Artificial Intelligence
  • Automobile
  • Computing
  • Entertainment
  • Gadget
  • How-To
  • Gaming
    • Roblox Codes
    • NYT Games
  • Mobile
  • News
Have an existing account? Sign In
Follow US
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Notepad++ Update Hijacked by State Hackers
HashTechWave > Blog > Computing > Breaking: Notepad++ Update Hijacked by State Hackers
Computing

Breaking: Notepad++ Update Hijacked by State Hackers

raza zaidi is a roblox gamer and anime lover
Last updated: February 4, 2026 11:23 pm
Raza Zaidi
raza zaidi is a roblox gamer and anime lover
ByRaza Zaidi
Anime & Manhwa Content Writer
Raza Zaidi is a writer at HashTechWave who lives at the verge of anime and gaming. Whether it’s breaking down the latest Solo Leveling twist, exploring...
Follow:
- Anime & Manhwa Content Writer
Published: February 4, 2026
Share

In a startling revelation that has shaken the open-source community, the developer of Notepad++ officially confirmed on Monday that the popular text editor’s update mechanism was hijacked by state-sponsored attackers. This sophisticated Notepad++ update hijack allowed malicious actors to intercept network traffic and deliver compromised updates to specific targets for nearly six months.

Contents
  • The Breach: What Happened?
  • Who Is Behind the Attack?
  • Timeline of the Attack
  • The Technical Flaw: Why WinGUP Failed
  • Is Your System Compromised?
  • How To Fix

If you are a user of Notepad++, particularly in the telecommunications or financial sectors understanding this threat is critical. Here is everything you need to know about this supply chain attack and how to secure your systems immediately.

The Breach: What Happened?

The incident was first brought to light by Notepad++ maintainer Don Ho, who revealed that the attack was not a flaw in the software’s code itself, but rather an infrastructure-level compromise. According to reports, suspected Chinese state-sponsored attackers managed to breach the project’s shared hosting server.

Inside the infrastructure, the attackers exploited the Notepad++ update hijack mechanism to intercept traffic destined for notepad-plus-plus.org. By manipulating the WinGUP updater, a component responsible for checking and downloading updates, they redirected specific users to malicious servers controlled by the threat group.

- Advertisement -

You May Also Like: Intrepid Studios Implodes: Team Resign Hit Ashes of Creation

Who Is Behind the Attack?

Security researchers have attributed this campaign to a Chinese nation-state threat actor known as Violet Typhoon (also tracked as Zirconium or APT31).

Victims report hands-on keyboard recon activity… Activity appears very targeted.

Security Researcher Kevin Beaumont, who first identified the anomalies in early December 2025.

Unlike a mass malware outbreak, this Notepad++ update hijack was highly targeted, where the attackers did not infect every user who updated the software. Instead, they targeted the filtered traffic and specifically those organizations having strategic interests in East Asia, particularly those in the telecommunications and financial services sectors.

- Advertisement -

Timeline of the Attack

The timeline of the Notepad++ update hijack reveals that the attackers had access to the infrastructure for a significant period:

  • June 2025: The supply chain compromise begins. Attackers gain access to the shared hosting server.
  • September 2, 2025: The hosting provider updates the server’s kernel and firmware, cutting off the attackers’ direct access to the server.
  • September – December 2025: Despite losing server access, the attackers maintained valid credentials for internal services. They continued to redirect traffic and exploit the Notepad++ update hijack vector until December 2, when they were finally locked out.
  • February 2, 2026: Notepad++ officially discloses the breach and details the remediation efforts.

The Technical Flaw: Why WinGUP Failed

The success of the Notepad++ update hijack relied on a weakness in the updater, known as WinGUP. Before version 8.8.9, the updater did not rigorously validate the integrity and authenticity of the downloaded update file.

- Advertisement -

Because the updater failed to enforce strict certificate and signature verification, attackers could easily swap the legitimate installer for a malicious one without the software raising an alarm. This critical gap allowed the Notepad++ update to proceed undetected by users who believed that they were simply installing a standard security patch.

Post by @GossiTheDog@cyberplace.social
View on Mastodon

Is Your System Compromised?

While this attack was targeted, every user should be vigilant. Kevin Beaumont and other researchers have advised organizations to check their logs for specific indicators of compromise related to the Notepad++ update hijack:

  • Check Network Requests: Look for the process gup.exe making network requests to domains other than notepad-plus-plus.org or github.com.
  • Suspicious Processes: Monitor for unexpected processes spawned by the Notepad++ installer.
  • Temp Files: Check for files named update.exe or AutoUpdater.exe appearing in the user’s TEMP folder, which is a common behavior of the malicious payload.

Note: If you are an enterprise user, you may want to block gup.exe from accessing the internet entirely unless you have robust monitoring in place.

- Advertisement -

Also Read: Moltbot & Mac Mini Guide: This Duo Is Taking Over AI

How To Fix

In response to the incident, the project’s website has been migrated to a new and secure hosting provider . The development team has also enhanced the WinGUP updater to verify both the certificate and the signature of any downloaded installer.

- Advertisement -

Hashtechwave Recommendation: Immediate action is required. While v8.8.9 addresses immediate issues, strict certificate and signature verification will be enforced starting with the upcoming v8.9.2 release, which is expected to launch in a month. Ensure you update immediately to stay ahead of these threats.

For the latest updates on this developing story and critical security alerts, bookmark this page and stay tuned to Hashtechwave.

- Advertisement -

TAGGED:Cyber SecurityHacking

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
Subscription Form

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Email Copy Link Print
Share
raza zaidi is a roblox gamer and anime lover
ByRaza Zaidi
Anime & Manhwa Content Writer
Follow:
Raza Zaidi is a writer at HashTechWave who lives at the verge of anime and gaming. Whether it’s breaking down the latest Solo Leveling twist, exploring Los Santos in GTA or ranking anime-inspired Roblox games, he brings both passion and perspective to every piece. He followed open-world games since the PS2 era and still gets pulled into side quests more than he’d admit. When he's not bingeing episodes on Crunchyroll, you’ll find him testing mods, chasing game deals, or revisiting classic open worlds, this time with ray tracing on.
Previous Article Intrepid Studios Implodes Mass Layoff's Hit Ashes of Creation Following Founder Exit Intrepid Studios Implodes: Team Resign Hit Ashes of Creation
Next Article OpenClaw Security Risks Hype vs Reality OpenClaw Security Risks: Hype vs Reality Guide (2026)

Follow US

Find US on Socials
Facebook Twitter Instagram
Subscribe to our newsletter

Get Newest Articles Instantly!

Subscription Form

Popular News
Tennis Zero Code
Roblox Tennis Zero Codes (March, 2026) – Claim Lucky Spin & Many other Rewards
Cabin Crew Simulator Codes - hashtechwave
Cabin Crew Simulator Codes (March, 2026) – Free Skybux & Flight Tips
Arise Crossover codes - hashtechwave
Arise Crossover Codes (March, 2026): Get Free Spins & Rewards

Follow Us on Socials

We use social media to react to breaking news, update supporters and share information

Twitter Linkedin Whatsapp Threads Instagram
HTW Logo Daymode HTW Logo Nightmode

Delivers trusted tech news, gaming guides, Roblox updates, and digital insights for everyday readers.

Hot News
Roblox Tennis Zero Codes (March, 2026) – Claim Lucky Spin & Many other Rewards
Cabin Crew Simulator Codes (March, 2026) – Free Skybux & Flight Tips
Arise Crossover Codes (March, 2026): Get Free Spins & Rewards
Trump Bans Anthropic From All Federal Agencies as OpenAI Secures Pentagon AI Contract
Roblox Garden Horizons Codes (March 2026)

Subscribe to our newsletter

You can be the first to find out the latest news and tips about trading, markets...

Subscription Form

Legal

  • Cookies Policy
  • Disclaimer
  • Privacy Policy
  • Terms and Condition

Company

  • Editorial Policy
  • Submit PR or Sponsored Article
  • About Us
  • Contact Us
© HashTechMedia Network. HashTechWave. All Rights Reserved.
Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..
Subscription Form

Zero spam, Unsubscribe at any time.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?