Backdoor in Notepad++

Hackers associated with the Chinese government used a Trojaned version of Notepad++ to deliver malware to selected users.

Notepad++ said that officials with the unnamed provider hosting the update infrastructure consulted with incident responders and found that it remained compromised until September 2. Even then, the attackers maintained credentials to the internal services until December 2, a capability that allowed them to continue redirecting selected update traffic to malicious servers. The threat actor “specifically targeted Notepad++ domain with the goal of exploiting insufficient update verification controls that existed in older versions of Notepad++.” Event logs indicate that the hackers tried to re-exploit one of the weaknesses after it was fixed but that the attempt failed.

Make sure you’re running at least version 8.9.1.

Posted on February 5, 2026 at 7:00 AM13 Comments

Comments

Q February 5, 2026 7:17 AM

So the “auto-update to stay protected” claims are false. It becomes “auto-update to expose yourself to risk”. I thought everyone had learned this after Microsoft shit the bed with the Windows 7 “Security” updates that were ads for Windows 10.

No thanks. I’ll download what I need, verify it does what I need without any “bonus” functionality, and keep it like that; no updates required.

Beside, notepad++ is a text editor, what does it need updates for? Apparently it needs them to download exploits.

I have a firewall in my setup that blocks everything by default. Both incoming and outgoing. Even the kernel can’t update the clock with NTP. Only the browser gets to see the outside world, and then only from inside a VM. So good luck to any app that tries to “phone home”, or remotely download unvetted code to install.

Ulf Dittmer February 5, 2026 8:34 AM

@wiredog

To some degree – IMO it says more about the security of AquaRay’s hosting arrangements than about the people behind Notepad++: the notepad-plus-plus.org web site got hacked, not the app.

Clive Robinson February 5, 2026 10:18 AM

@ Q, ALL,

With regards,

“So the “auto-update to stay protected” claims are false.”

This has been known for a very long time.

When you analyse it, it fails because there is no verifiable way to establish a “root of trust” as Certificate Authorities can not be trusted to do what they are supposed to do, which is maintain a minimum level of security so that the “Certificate Chain” can be trusted so what we now call the “Supply Chain” is well and truly broken beyond any hope of repair as it’s all electronic on the Internet these days.

I the past you used to buy software on floppies, CD/DVDs or even tape. This “Physical media” was actually hard to usurp. Though historically Microsoft was the first to send out a prototype virus on such disks as part of MS Word on tech-support disks. Apple had the claim to fame of being the first to have hardware infected in the supply chain so that plugging your iPod into a USB port doomed you. An attack type that spread later to not just memory sticks, but broad band and WiFi dongles.

But you will find way back on this blog @Nick P and myself pointing out why “code signing” was a load of nonsense and how it could fairly easily be go around.

And eventually such attacks came to pass…

On average the musings of “the usual suspects” here were around eight years ahead of the curve.

Some still are as has been seen with hardware failings that gave us “The Xmas Gift that keeps giving”.

I’ve repeatedly warned about smart devices and “secure apps” like “Signal” where the “security end point” was on the same device as the “communications endpoint”. So why bother attacking the crypto when you can just do an “end run attack” through the OS, Drivers, or Other Apps to the user interface.

This is now known as “Client Side Scanning” and you can not stop it on devices where the foundations that support it got built into the OS by Apple, Google, and Microsoft, as part of C19 contact tracing…

To me this was obvious after I’d shown to “proof level” via the Work of Claude Shannon in the 1940’s and Gus Simmons work built on that in the 1980’s that it was not only not possible to prevent secure comms channels with E2EE but as importantly make them oblivious to any observer. All you needed was a “one time pad” cipher and a “one time phrase” code book (actually as long as you used the OTP correctly and the phrase book was constructed correctly it did not actually need to be used as “one time phrases”).

Get the “security endpoint” off of the device with the communications end point and even “client side scanning” will not work.

But doing this is “not convenient” for the average person who can not even say OpSec let alone what it means.

So they will never be secure, which makes the few of us who try to be secure just one silly move by a second party vulnerable.

It’s why I’ve worked on how to make such systems “deniable”…

The thing is others have taken the same ideas and used it as proof as to why AI “guide rails” will always be vulnerable to “prompt injection attacks”…

So as you can see there is a reason why I talk not just about “air gaps” but “energy caps” and “hard segregation” techniques. Which Microsoft, and Google try their best to prevent…

At the moment your choices of OS is kind of limited to the BSDs and GNU Linuxs…

Which as was pointed out “Agent P” was spending his time trying to make vulnerable via SystemD etc…

Vesselin Bontchev February 5, 2026 10:59 AM

This has actually been known since the summer of 2025…

Anyway. Besides Rapid7’s report linked by the Ars article, here’s Kaspersky’s and Censys’ reports; both providing excellent additional information.

KC February 5, 2026 11:10 AM

Per Ars, Kevin Beaumont heard from three organizations, as of his December 2 blog post, who experienced security incidents; all three had interests in East Asia.

Cybersecurity companies have observed targets in Vietnam, El Salvador, Australia, and the Philippines.

“The variety of infection chains makes detection of the Notepad++ supply chain attack quite a difficult and at the same time creative task.”

https://thehackernews.com/2026/02/notepad-hosting-breach-attributed-to.html

Ismar February 5, 2026 4:02 PM

The use of Notepad++ is fairly common among software / hardware engineers and it goes back decades. It would appear that China is just trying to steal some IP as usual.
I would be surprised if the big tech companies were not going to blacklist this app from their systems starting soon.

Confucius February 6, 2026 3:54 AM

Where is the prof of Chinese involvement?

Bruce Schneider, once my idol and somebody whom I refer a lot from around 2004, now become a primitive propaganda echo.

Good bye!

HowOldAVersionIsSafe February 7, 2026 12:20 PM

How old a Notepad++ version is old enough to be pre-supply-chain-attack? I couldn’t find this info anywhere. But there must have been a before. I’ve got a fairly ancient Notepad++ install used in an offline manner, if it has ordinary security vulnerabilities because of its age then that doesn’t matter in my use case, but is it old enough (circa 2022) to be from before the backdooring first happened? Thanks in advance

Scott February 7, 2026 6:18 PM

“ No thanks. I’ll download what I need, verify it does what I need without any “bonus” functionality, and keep it like that; no updates required.”

How does that necessarily help? You’re downloading something that could already be infected. Not just updates have to be infected, after all.

Q February 7, 2026 10:52 PM

How does that necessarily help? You’re downloading something that could already be infected.

The verify step is important: ‘… verify it does what I need without any “bonus” functionality …’

Always verify, don’t blindly trust. Automatic updates skip the verify step, and go straight to blindly trusting.

There needs to be an article: “Automatic updates considered harmful”

Mike Charlie February 11, 2026 6:45 AM

Notepad++, Putty and Wireshark have always struck me as likely targets for such operations. They are all used by in IT ops.

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.