Close Menu
Technophile NewsTechnophile News
  • Home
  • News
  • PC
  • Phones
  • Android
  • Gadgets
  • Games
  • Guides
  • Accessories
  • Reviews
  • Spotlight
  • More
    • Artificial Intelligence
    • Web Stories
    • Press Release
What's On
Our Favorite Pixel Phone Is 0 Off

Our Favorite Pixel Phone Is $100 Off

4 February 2026
Ikea’s new Matter smart home devices are having connection problems

Ikea’s new Matter smart home devices are having connection problems

4 February 2026
Measles Is Causing Brain Swelling in Children in South Carolina

Measles Is Causing Brain Swelling in Children in South Carolina

4 February 2026
This Town, 2.0 | The Verge

This Town, 2.0 | The Verge

4 February 2026
Notepad++ Users, You May Have Been Hacked by China

Notepad++ Users, You May Have Been Hacked by China

4 February 2026
Facebook X (Twitter) Instagram
  • Privacy
  • Terms
  • Advertise
  • Contact Us
Wednesday, February 4
Facebook X (Twitter) Instagram YouTube
Technophile NewsTechnophile News
Demo
  • Home
  • News
  • PC
  • Phones
  • Android
  • Gadgets
  • Games
  • Guides
  • Accessories
  • Reviews
  • Spotlight
  • More
    • Artificial Intelligence
    • Web Stories
    • Press Release
Technophile NewsTechnophile News
Home » Notepad++ Users, You May Have Been Hacked by China
News

Notepad++ Users, You May Have Been Hacked by China

By News Room4 February 20264 Mins Read
Facebook Twitter Pinterest LinkedIn Telegram Tumblr Reddit WhatsApp Email
Notepad++ Users, You May Have Been Hacked by China
Share
Facebook Twitter LinkedIn Pinterest Email

Infrastructure delivering updates for Notepad++—a widely used text editor for Windows—was compromised for six months by suspected China-state hackers who used their control to deliver backdoored versions of the app to select targets, developers said Monday.

“I deeply apologize to all users affected by this hijacking,” the author of a post published to the official notepad-plus-plus.org site wrote Monday. The post said that the attack began last June with an “infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org.” The attackers, whom multiple investigators tied to the Chinese government, then selectively redirected certain targeted users to malicious update servers where they received backdoored updates. Notepad++ didn’t regain control of its infrastructure until December.

The attackers used their access to install a never-before-seen payload that has been dubbed Chrysalis. Security firm Rapid 7 described it as a “custom, feature-rich backdoor.”

“Its wide array of capabilities indicates it is a sophisticated and permanent tool, not a simple throwaway utility,” company researchers said.

Hands-On Keyboard Hacking

Notepad++ said that officials with the unnamed provider hosting the update infrastructure consulted with incident responders and found that it remained compromised until September 2. Even then, the attackers maintained credentials to the internal services until December 2, a capability that allowed them to continue redirecting selected update traffic to malicious servers. The threat actor “specifically targeted Notepad++ domain with the goal of exploiting insufficient update verification controls that existed in older versions of Notepad++.” Event logs indicate that the hackers tried to re-exploit one of the weaknesses after it was fixed but that the attempt failed.

According to independent researcher Kevin Beaumont, three organizations told him that devices inside their networks that had Notepad++ installed experienced “security incidents” that “resulted in hands-on keyboard threat actors,” meaning the hackers were able to take direct control using a web-based interface. All three of the organizations, Beaumont said, have interests in East Asia.

The researcher explained that his suspicions were aroused when Notepad++ version 8.8.8 introduced bug fixes in mid-November to “harden the Notepad++ Updater from being hijacked to deliver something … not Notepad++.”

The update made changes to a bespoke Notepad++ updater known as GUP, or alternatively, WinGUP. The gup.exe executable responsible reports the version in use to https://notepad-plus-plus.org/update/getDownloadUrl.php and then retrieves a URL for the update from a file named gup.xml. The file specified in the URL is downloaded to the %TEMP% directory of the device and then executed.

Beaumont wrote:

If you can intercept and change this traffic, you can redirect the download to any location it appears by changing the URL in the property.

This traffic is supposed to be over HTTPS, however it appears you may be [able] to tamper with the traffic if you sit on the ISP level and TLS intercept. In earlier versions of Notepad++, the traffic was just over HTTP.

The downloads themselves are signed—however some earlier versions of Notepad++ used a self signed root cert, which is on Github. With 8.8.7, the prior release, this was reverted to GlobalSign. Effectively, there’s a situation where the download isn’t robustly checked for tampering.

Because traffic to notepad-plus-plus.org is fairly rare, it may be possible to sit inside the ISP chain and redirect to a different download. To do this at any kind of scale requires a lot of resources.

Beaumont published his working theory in December, two months to the day prior to Monday’s advisory by Notepad++. Combined with the details from Notepad++, it’s now clear that the hypothesis was spot on.

Beaumont also warned that search engines are so “rammed full” of advertisements pushing trojanized versions of Notepad++ that many users are unwittingly running them inside their networks. A rash of malicious Notepad++ extensions only compounds the risk.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related News

Our Favorite Pixel Phone Is 0 Off

Our Favorite Pixel Phone Is $100 Off

4 February 2026
Ikea’s new Matter smart home devices are having connection problems

Ikea’s new Matter smart home devices are having connection problems

4 February 2026
Measles Is Causing Brain Swelling in Children in South Carolina

Measles Is Causing Brain Swelling in Children in South Carolina

4 February 2026
This Town, 2.0 | The Verge

This Town, 2.0 | The Verge

4 February 2026
Overwatch: all the news about Blizzard’s hit hero shooter

Overwatch: all the news about Blizzard’s hit hero shooter

4 February 2026
A New AI Math Startup Just Cracked 4 Previously Unsolved Problems

A New AI Math Startup Just Cracked 4 Previously Unsolved Problems

4 February 2026
Top Articles
The CES 2026 stuff I might actually buy

The CES 2026 stuff I might actually buy

10 January 202660 Views
The Nex Playground and Pixel Buds 2A top our list of the best deals this week

The Nex Playground and Pixel Buds 2A top our list of the best deals this week

13 December 202548 Views
OpenAI Launches GPT-5.2 as It Navigates ‘Code Red’

OpenAI Launches GPT-5.2 as It Navigates ‘Code Red’

11 December 202545 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss
Overwatch: all the news about Blizzard’s hit hero shooter

Overwatch: all the news about Blizzard’s hit hero shooter

4 February 2026

Overwatch 2, the sequel to Activision Blizzard’s hit hero shooter Overwatch, was announced in 2019…

A New AI Math Startup Just Cracked 4 Previously Unsolved Problems

A New AI Math Startup Just Cracked 4 Previously Unsolved Problems

4 February 2026
OpenClaw’s AI ‘skill’ extensions are a security nightmare

OpenClaw’s AI ‘skill’ extensions are a security nightmare

4 February 2026
Mistral’s New Ultra-Fast Translation Model Gives Big AI Labs a Run for Their Money

Mistral’s New Ultra-Fast Translation Model Gives Big AI Labs a Run for Their Money

4 February 2026
Technophile News
Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact Us
© 2026 Technophile News. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.