Chinese language state-sponsored risk actors had been probably behind the hijacking of Notepad++ replace site visitors final yr that lasted for nearly half a yr, the developer states in an official announcement at the moment.
The attackers intercepted and selectively redirected replace requests from sure customers to malicious servers, serving tampered replace manifests by exploiting a safety hole within the Notepad++ replace verification controls.
An announcement from the internet hosting supplier for the replace function explains that the logs point out that the attacker compromised the server with the Notepad++ replace software.

Exterior safety consultants serving to with the investigation discovered that the assault began in June 2025. In accordance the developer, the breach had a slender focusing on scope and redirected solely particular customers to the attacker’s infrastructure.
“A number of unbiased safety researchers have assessed that the risk actor is probably going a Chinese language state-sponsored group, which might clarify the extremely selective focusing on noticed in the course of the marketing campaign,” reads Notepad++’s announcement.
“The attackers particularly focused Notepad++ area with the aim of exploiting inadequate replace verification controls that existed in older variations of Notepad++. “
In December, Notepad++ launched model 8.8.9 to handle a safety weak spot in its WinGUp replace device after a number of researchers reported that the updater would obtain malicious packages as an alternative of professional ones.
Safety researcher Kevin Beaumont had warned that he knew of at the very least three organizations affected by these replace hijacks, which had been adopted by hands-on reconnaissance exercise on the community.
Notepad++ is a free and open-source editor for textual content and supply code and a well-liked device on Home windows, with tens of thousands and thousands of customers the world over.
The developer now explains that the assault occurred in June 2025, when a internet hosting supplier for the software program was compromised, enabling the attackers to carry out focused site visitors redirections.
In early September, the attacker quickly misplaced entry when the server kernel and firmware had been up to date. Nonetheless, the risk actor was capable of regain its foothold by utilizing beforehand obtained inside service credentials that had not been modified.
This continued till December 2, 2025, when the internet hosting supplier lastly detected the breach and terminated the attacker’s entry.
Notepad++ has since migrated all purchasers to a brand new internet hosting supplier with stronger safety, rotated all credentials that might have been stolen by the attackers, fastened exploited vulnerabilities, and totally analyzed logs to verify that the malicious exercise stopped.
Notepad++ customers are beneficial to take the next actions to strengthen their safety:
- Change credentials for SSH, FTP/SFTP, and MySQL
- Overview WordPress admin accounts, reset passwords, and take away pointless customers
- Replace WordPress core, plugins, and themes, and allow computerized updates if relevant
Ranging from Notepad++ model 8.8.9, WinGup verifies installer certificates and signatures, and the replace XML is cryptographically signed.
The developer additionally said that they plan to implement necessary certificates signature verification in model 8.9.2, which is anticipated to be launched in a few month.
BleepingComputer has contacted Don Ho, the first developer of Notepad++ developer for indicators of compromise (IoCs) or different info that might assist customers decide in the event that they had been impacted.
Don Ho informed us that sifting by way of the server logs the incident response workforce recognized indicators of intrusion however no IoCs. “Our IR workforce and I additionally requested IOCs straight from the previous internet hosting supplier, however we weren’t profitable in acquiring any,” the developer informed us.
Nonetheless, Fast 7 researchers uncovered the marketing campaign and attribute it to the Chinese language APT group Lotus Blossom (a.okay.a. Raspberry Hurricane, Bilbug, Spring Dragon) deploying “a beforehand undocumented customized backdoor” they named Chrysalis.
Primarily based on the big variety of capabilities, the researchers consider Chrysalis is a classy device with a everlasting function on the sufferer system.
The researchers printed an in depth technical evaluation of the malware and observe that they discovered no definitive artifacts to verify exploitation of the updater-related mechanism.
“The one confirmed conduct is that execution of “notepad++.exe” and subsequently “GUP.exe” preceded the execution of a suspicious course of ‘replace.exe’,” Fast 7 says.
Replace [February 2nd, 12:02 EST]: Article up to date with remark from Notepad++ developer Don Ho, which arrived after publishing, and particulars from Fast 7’s investigation.

Fashionable IT infrastructure strikes quicker than handbook workflows can deal with.
On this new Tines information, find out how your workforce can cut back hidden handbook delays, enhance reliability by way of automated response, and construct and scale clever workflows on prime of instruments you already use.



