Notepad++ Users, You May Have Been Hacked by China
Notepad++ Under Siege: State-Backed Hackers Hijack Update Infrastructure for Six Months
In a shocking revelation that has sent shockwaves through the cybersecurity community, Notepad++—the beloved open-source text editor used by millions worldwide—has fallen victim to a sophisticated, state-sponsored cyberattack that went undetected for half a year.
The developer behind Notepad++ issued a heartfelt apology Monday, confessing that the software’s update infrastructure was compromised starting last June. This wasn’t just any ordinary breach; this was a meticulously planned operation by suspected Chinese government hackers who managed to intercept and redirect update traffic, selectively targeting specific users with malicious payloads.
“I deeply apologize to all users affected by this hijacking,” the developer wrote in a post published on the official notepad-plus-plus.org site. The breach began with an “infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org.”
What makes this attack particularly insidious is the precision with which it was executed. Rather than deploying a mass attack, the hackers selectively redirected certain targeted users to malicious update servers where they received backdoored versions of the software. The Notepad++ team didn’t regain control of their infrastructure until December—six months after the initial compromise.
The attackers deployed a never-before-seen payload dubbed Chrysalis, described by security firm Rapid7 as a “custom, feature-rich backdoor.” The sophistication of this malware is alarming. “Its wide array of capabilities indicates it is a sophisticated and permanent tool, not a simple throwaway utility,” researchers noted.
The Anatomy of a Stealth Attack
The breach represents what security experts call “hands-on keyboard hacking”—a term that describes when attackers gain enough access to directly control systems through web-based interfaces. Independent researcher Kevin Beaumont revealed that three organizations reported security incidents involving Notepad++ installations that “resulted in hands-on keyboard threat actors.”
What’s particularly concerning is that all three organizations with reported incidents have interests in East Asia, suggesting the attack may have been part of a broader geopolitical operation targeting specific industries or research sectors.
The attack exploited weaknesses in Notepad++’s update verification controls, which existed in older versions of the software. Even after the initial compromise was addressed in September, the attackers maintained credentials to internal services until December 2, allowing them to continue their operations.
Beaumont’s investigation uncovered a critical vulnerability in the update mechanism. The Notepad++ updater, known as GUP or WinGUP, reports version information to a PHP endpoint and retrieves update URLs from an XML file. This traffic, which should have been secured with HTTPS, was vulnerable to interception.
“The downloads themselves are signed—however some earlier versions of Notepad++ used a self-signed root cert, which is on Github,” Beaumont explained. “With 8.8.7, the prior release, this was reverted to GlobalSign. Effectively, there’s a situation where the download isn’t robustly checked for tampering.”
The Perfect Storm of Vulnerabilities
The attack exploited multiple weaknesses simultaneously. First, the traffic to notepad-plus-plus.org was relatively rare, making it easier for attackers to intercept without raising immediate suspicion. Second, the update verification process wasn’t robust enough to prevent tampering. Third, the attackers had the resources and sophistication to maintain this operation at scale.
Beaumont’s suspicions were first aroused in December when Notepad++ version 8.8.8 introduced bug fixes specifically designed to “harden the Notepad++ Updater from being hijacked.” His working theory, published two months before Notepad++’s official advisory, proved remarkably accurate.
The implications extend far beyond Notepad++ itself. Beaumont warned that search engines are “rammed full” of advertisements pushing trojanized versions of Notepad++, meaning many users may be unwittingly running compromised software. The proliferation of malicious Notepad++ extensions only compounds the risk.
A Wake-Up Call for Open Source Security
This incident serves as a stark reminder of the vulnerabilities that can exist even in well-established, widely-used software. Notepad++ has been a staple tool for developers for years, trusted by millions. The fact that it could be compromised for six months without detection highlights the sophisticated nature of modern cyber threats.
For users, the incident underscores the importance of keeping software updated to the latest versions, being cautious about where you download software from, and being aware that even trusted tools can be compromised. For developers and organizations, it’s a reminder of the critical importance of robust security practices, including proper certificate management, secure update mechanisms, and continuous monitoring for suspicious activity.
As the cybersecurity community continues to analyze this breach, one thing is clear: the Notepad++ incident represents a new level of sophistication in supply chain attacks, combining state-level resources with precise targeting and long-term persistence. It’s a wake-up call that no software, no matter how trusted or widely-used, is immune to determined attackers.
Tags: Notepad++ hacked, state-sponsored cyberattack, Chinese hackers, Chrysalis backdoor, supply chain attack, update infrastructure compromise, cybersecurity breach, hands-on keyboard hacking, open source security, Notepad++ vulnerability, malicious updates, East Asia targeting
Viral Sentences:
- “Notepad++—the trusted text editor used by millions—was secretly backdoored for six months”
- “State-backed hackers pulled off the perfect software supply chain heist”
- “Your favorite text editor might have been spying on you without you knowing”
- “The Notepad++ breach is every developer’s worst nightmare come true”
- “Six months of undetected spying through a simple text editor”
- “When even open-source tools aren’t safe from government hackers”
- “The sophisticated attack that slipped through the cracks for half a year”
- “How Chinese state hackers hijacked Notepad++ to spy on select targets”
- “The custom ‘Chrysalis’ backdoor that changed everything”
- “Hands-on keyboard access through a text editor—it sounds like a movie plot”
- “The vulnerability that let hackers intercept your software updates”
- “Why your Notepad++ installation might be more dangerous than you think”
- “The supply chain attack that proves no software is immune”
- “When trusted tools become trojan horses for state-sponsored espionage”
,




Leave a Reply
Want to join the discussion?Feel free to contribute!