Notepad++ Update Infrastructure Hijacked in Targeted Supply Chain Attack


February 3, 2026

Executive Summary

In early February 2026, maintainers of Notepad++ confirmed that its update infrastructure had been selectively hijacked as part of a long-running, highly targeted supply-chain attack.


The compromise did not involve vulnerabilities in the Notepad++ application itself. Instead, attackers gained access at the hosting provider infrastructure level, enabling them to intercept and redirect update traffic for a subset of users to attacker-controlled servers.


Independent analysis suggests the activity is consistent with a state-sponsored threat actor, likely of Chinese origin, based on the precision, restraint, and duration of the campaign.


The incident underscores a growing reality in modern cyber operations: software trust chains are now a primary attack surface.

What happened

According to disclosures published alongside the Notepad++ v8.8.9 release, the investigation revealed:


  • Attackers compromised a shared hosting environment used by the Notepad++ update service
  • The compromise allowed selective redirection of update requests
  • Only specific users were targeted, rather than mass distribution
  • Malicious update manifests were served from attacker-controlled infrastructure
  • No vulnerabilities were found in the Notepad++ source code itself


The attack began as early as June 2025 and persisted intermittently until late 2025, with remediation completed in December.

Hosting provider findings

Following a coordinated incident-response effort involving external security experts, the former hosting provider confirmed several critical findings:


1. Infrastructure compromise


  • The shared hosting server was compromised until 2 September 2025
  • Kernel and firmware updates on that date appear to have removed attacker access
  • No evidence of similar activity was found on other hosting servers


2. Credential persistence


  • Despite losing server access, attackers retained internal service credentials until 2 December 2025
  • These credentials enabled continued redirection of traffic to malicious update servers


3. Targeted intent


  • Logs show the attackers explicitly searched for the Notepad++ domain
  • No other tenants on the shared infrastructure were targeted
  • The attackers likely understood weaknesses in older update-verification mechanisms


4. Containment and remediation


By 2 December 2025, the hosting provider had:


  • Fixed the exploited infrastructure vulnerabilities
  • Rotated all compromised credentials
  • Attempted re-exploitation was detected and blocked
  • Verified no lateral compromise across other hosting environments

Timeline overview

Period Activity
June 2025 Initial compromise begins
Sept 2, 2025 Infrastructure access removed
Nov 10, 2025 Security experts estimate attacker activity ceases
Dec 2, 2025 All credentials rotated, final remediation
Feb 2, 2026 Public disclosure and update guidance

Based on combined assessments, the effective compromise window spans June–December 2025.

Why this matters

This incident highlights several critical trends Cybergen observes across modern threat activity:


1. Supply-chain attacks are becoming surgical


The attackers:


  • Avoided mass infection
  • Limited exposure to evade detection
  • Focused on trust relationships rather than exploit development


This behaviour aligns with state-level operational discipline, not opportunistic cybercrime.


2. Infrastructure is now the weak link


Even with secure code:


  • Hosting platforms
  • Update delivery mechanisms
  • Credential hygiene
  • Trust validation


…can all be leveraged to undermine software integrity.


3. Absence of IoCs is not the absence of compromise


Despite analysing ~400GB of server logs, investigators were unable to extract usable Indicators of Compromise, such as:


  • IP addresses
  • Domains
  • Malware hashes


This reinforces a key intelligence reality: advanced actors prioritise stealth over noise.

Remediation and security improvements

Hosting changes


  • The Notepad++ website has been fully migrated to a new hosting provider
  • Stronger infrastructure-level security controls are now in place


Update mechanism hardening


From v8.8.9 onward:

  • WinGup now verifies both certificate and installer signature
  • Update XML responses are cryptographically signed (XMLDSig)


From v8.9.2 (expected imminently):



  • Signature and certificate verification will be strictly enforced
  • Users are advised to manually update to v8.9.1 or later.

Cybergen perspective

This incident is not an anomaly. It reflects a broader shift in how advanced threat actors operate:


  • Exploiting implicit trust
  • Targeting delivery pipelines
  • Bypassing traditional perimeter controls
  • Operating below detection thresholds


For organisations, this reinforces the need to move beyond vulnerability-centric security models and adopt threat-led, intelligence-driven defence that focuses on:


  • Real adversary behaviour
  • Supply-chain exposure
  • Credential abuse
  • Infrastructure trust assumptions

Final note

The Notepad++ maintainer has issued a full apology and taken decisive corrective action. Based on the evidence disclosed, the issue appears fully contained.

Ready to strengthen your security posture? Contact us today for more information on protecting your business.


Let's get protecting your business

Disaster Recovery

Keep your data secure and protected at all times.


Cybergen News

Sign up to get industry insights, trends, and more in your inbox.

Contact Us

SHARE THIS

Latest Posts

Blue shield with a padlock icon in a digital background with binary code, representing cybersecurity.
February 23, 2026
Why compliance-driven security fails in 2026. Learn how attackers exploit identity and attack paths, and how intelligence-led penetration testing reduces real cyber risk
Woman presenting AI concept on screen, pointing with a laptop. Blue tones, glowing
February 21, 2026
How AI is transforming cyber attacks in 2026, from deepfake phishing to adaptive malware — and what CISOs must do now to reduce risk and strengthen resilience.
Laptop with a fingerprint scan graphic overlaid, symbolizing secure access.
February 17, 2026
Why traditional penetration testing fails in 2026, and what effective, risk-driven testing really looks like. Discover how to move beyond CVSS scores and vulnerability lists to attacker-focused attack paths, identity compromise, lateral movement, and measurable risk reduction that actually improves security outcomes.
Person wearing VR headset, text
February 11, 2026
Explore the future of cybersecurity in 2026. Discover emerging threats, evolving attack methods, and how organisations can stay resilient in a changing threat landscape.
Man looking at a digital interface with holographic building model, graphs, and code overlays, indoors.
February 11, 2026
Cyber threat intelligence reveals how modern ransomware attacks really start: credential abuse, trusted access, and quiet pre-positioning long before impact.
Red and blue digital graphic with the word
February 5, 2026
CREST pen testing reveals what really happens after initial compromise. Learn how attackers escalate privileges, move laterally, and how testing exposes real risk.
Hand holding magnifying glass over digital warning sign on screen.
February 1, 2026
High-severity vulnerabilities don’t equal real cyber risk. Learn why CVSS-driven risk registers fail, how attackers exploit exposure, and how CTEM reduces real-world risk.
Hand touching a glowing security shield interface with a binary code background.
February 1, 2026
Breaches persist despite audits and investment. Learn how threat-led security turns cyber activity into prioritised risk reduction with threat intelligence, MDR and CTEM.
Silhouette of person holding laptop, surrounded by multiple glowing computer screens displaying code. Blue tones.
January 24, 2026
Most cyber attacks begin quietly with recon and stolen credentials, long before your tools alert. Learn what security teams miss and how to detect intrusions earlier with threat intel, MDR and hunting.
Isometric illustration of cyber security threats, including hackers, a computer breach, and financial data theft.
By Aaron Bennett January 21, 2026
Stop trusting scan results alone. Discover what penetration testing reveals that scanners miss: real exploit paths, identity gaps, lateral movement, and impact.