Trending:
Cybersecurity

Notepad++ update hijacked for six months in Chinese state-sponsored supply chain attack

A Chinese state-sponsored group intercepted Notepad++ updates from June to December 2025, selectively targeting users through compromised hosting infrastructure. The attack exploited weak update verification in versions before 8.8.9, highlighting supply chain risks in open-source tooling - especially relevant given APAC's increasing focus on software supply chain security.

Notepad++ update hijacked for six months in Chinese state-sponsored supply chain attack

What Happened

Notepad++ confirmed today that attackers intercepted its update mechanism for six months in 2025, redirecting select users to malicious servers. The compromised shared hosting provider gave attackers access from June until September 2, with retained credentials enabling continued exploitation until December 2.

Security researchers attribute the attack to Chinese state-sponsored actors conducting targeted espionage, likely focused on South Asian political and economic entities. The highly selective nature - only certain users were redirected - aligns with state-level intelligence gathering rather than broad malware distribution.

The Technical Reality

This wasn't a flaw in Notepad++ code. Pre-version 8.8.8, the WinGUP updater didn't enforce update source verification. Pre-8.8.9, file validation was inadequate. That's a supply chain attack vector any enterprise should recognize: the update mechanism became the weakness.

Version 8.8.9 (released December 9) added signature and certificate verification. Version 8.9 (December 27) dropped the self-signed certificate entirely, moving to GlobalSign-issued certificates only. Users who installed the self-signed cert should remove it.

Security researcher Kevin Beaumont flagged anomalies on December 2, noting limited reports of Notepad++ processes spawning initial access in organizations with East Asian interests. The targeting pattern matters here - this was precision work, not spray-and-pray malware.

What This Means for APAC Enterprise

Three takeaways:

Supply chain risks aren't theoretical. A widely-used open-source tool, millions of downloads, six months of compromise. The shared hosting provider remains unnamed, but claimed they've fixed vulnerabilities and blocked re-exploitation. We'll see.

Update mechanisms are attack surfaces. Your security controls need to verify updates before installation, not trust the delivery mechanism. Notepad++ migrated updates to GitHub - that's infrastructure defense, not just incident response.

State-sponsored targeting is getting more selective. If your organization works in APAC geopolitics, economics, or infrastructure, assume sophisticated actors are probing supply chains. CISA's recent warnings about Chinese groups maintaining network access for years connect here.

The Notepad++ team responded competently once detected. The real question: how many other open-source tools are running update mechanisms with similar gaps? History suggests we'll find out the hard way.