Hi
@Jared,
Notepad++ confirmed that its update infrastructure was compromised in a targeted supply‑chain attack between June 2025 and December 2025. Investigators, including external security experts and the former hosting provider, determined that the breach occurred at the hosting provider level, not through any vulnerability in Notepad++ itself. Attackers were able to intercept and redirect update traffic intended for notepad-plus-plus.org.
Only certain targeted users were affected. Their update requests were silently redirected to attacker‑controlled servers serving malicious update manifests, meaning users could have unknowingly installed tampered binaries if they updated Notepad++ during the affected period.
Timeline highlights:
- June 2025 – Attack began with infrastructure‑level compromise.
- Nov 10, 2025 – Security experts believe the attack activity ceased.
- Dec 2, 2025 – Hosting provider confirms attacker access ended after credential rotations and hardening.
Users who updated Notepad++ between June and December 2025 are advised to ensure they are now running version 8.8.9 or later, which includes improved integrity checks to prevent similar attacks.
To summarize: it was the update servers that were compromised, and the attack is no longer active. Compromised versions were only ever delivered via the application's auto-updater to certain targeted users, and not via Patch My PC. The latest version has been hardened to prevent it reoccurring.
For more information about this, please visit:
Notepad++ Hijacked by State-Sponsored Hackers (https://notepad-plus-plus.org/news/hijacked-incident-info-update/)