Notepad++ Update Hijacked by Chinese State-Sponsored Attackers: What We Know (2026)

A shocking revelation has come to light, exposing a sophisticated attack by state-sponsored hackers. The popular software Notepad++ fell victim to a supply chain attack, compromising its update mechanism and potentially exposing users to malicious activities. This incident, confirmed by Notepad++ maintainer Don Ho, highlights the critical importance of software security and the need for constant vigilance.

The timeline of this attack is intriguing. In December 2025, security researcher Kevin Beaumont reported that several organizations in East Asia had experienced security incidents linked to Notepad++ processes. These incidents involved hands-on keyboard reconnaissance activities, indicating a highly targeted and sophisticated attack.

But here's where it gets controversial: the attackers exploited security weaknesses in Notepad++'s updater, known as WinGUP. Prior to version 8.8.8, released in November 2025, the updater lacked sufficient hardening to prevent changes to the update source. This allowed the attackers to intercept network traffic and deliver malicious updates instead of legitimate ones. Beaumont noted that redirecting traffic on a large scale required significant resources, suggesting a well-funded and determined adversary.

The attack was attributed to Chinese nation-state threat actors Zirconium, also known as Violet Typhoon. The supply chain compromise occurred in June 2025, and the hosting provider's server remained compromised until September 2, 2025, when an update to the kernel and firmware cut off the attackers' access. However, the bad actors maintained access to internal service credentials until December, allowing them to redirect traffic to their servers and deliver compromised updates.

The hosting provider stated that the attackers specifically targeted the Notepad++ domain, likely aware of vulnerabilities related to insufficient update verification controls. They fixed these vulnerabilities, but the threat actors attempted to re-exploit one of them, suggesting this was their initial point of entry.

So, what does this mean for organizations? Notepad++ is widely used by IT and software development staff, but this attack appears to have been aimed at specific targets. Beaumont advised organizations not to overreact but to check for suspicious activities, such as network requests from gup.exe to unauthorized domains, unexpected processes spawned by the installer, and specific files in the user TEMP folder.

Additionally, given the prevalence of malware masquerading as Notepad++, organizations should verify the legitimacy of the installed version. Beaumont suggested blocking internet access for certain processes and domains to mitigate potential risks.

This incident serves as a stark reminder of the ever-evolving nature of cyber threats and the need for robust security measures. As we navigate the digital landscape, staying informed and proactive is crucial. What are your thoughts on this attack? Do you think organizations should take more stringent measures to protect against such threats? Share your insights in the comments below!

Notepad++ Update Hijacked by Chinese State-Sponsored Attackers: What We Know (2026)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Catherine Tremblay

Last Updated:

Views: 6016

Rating: 4.7 / 5 (67 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Catherine Tremblay

Birthday: 1999-09-23

Address: Suite 461 73643 Sherril Loaf, Dickinsonland, AZ 47941-2379

Phone: +2678139151039

Job: International Administration Supervisor

Hobby: Dowsing, Snowboarding, Rowing, Beekeeping, Calligraphy, Shooting, Air sports

Introduction: My name is Catherine Tremblay, I am a precious, perfect, tasty, enthusiastic, inexpensive, vast, kind person who loves writing and wants to share my knowledge and understanding with you.