Notepad++ hijacked by state-sponsored actors
Technical nature of the compromise
- Attack appears to be a classic supply‑chain MITM on the update infrastructure:
- DNS/hosting for notepad-plus-plus.org was compromised; update traffic from some users was redirected to attacker‑controlled servers.
- Older Notepad++ versions had “insufficient update verification”: self‑signed certificate with the private key in the public repo, and unsigned update manifests.
- Attackers could return a malicious installer in response to the auto‑update check. Commenters note this means arbitrary code execution was possible.
- Linked analyses say attacks were highly targeted, seemingly focused on a small group of Asian users with “hands‑on‑keyboard” follow‑up.
- Many are frustrated that the official write‑up gives almost no detail on payload behavior, indicators of compromise, or victim profile.
Who was at risk and what to do
- Consensus reading: if you were on ≤8.8.1 and did not auto‑update during roughly June–Dec 2025, you were probably not hit.
- Anyone who updated via the built‑in updater during that window could have received a malicious binary; manual installs via package managers that pin hashes (Chocolatey, winget, distro repos) were likely safer.
- Strong advice for those who think they were targeted: treat the machine as compromised (reinstall OS from trusted media, don’t reuse binaries).
- No clear answer on whether AV/EDR would reliably detect this; people stress that scanners are reactive and incomplete.
Auto‑updates, signing, and small‑project risk
- Many see this as a textbook example of:
- Excessive/unnecessary auto‑update nagging.
- Weak update signing practices (self‑signed cert in repo, unsigned manifests).
- A small volunteer project running high‑value infrastructure on shared hosting.
- Disagreement on tactics:
- Some advocate disabling all auto‑updates and manually vetting updates or using package managers with checksums.
- Others counter that staying unpatched is a much bigger real‑world risk than rare supply‑chain attacks.
- Suggestions: proper CA‑issued code signing, HSMs, hardcoded keys in the client, reproducible builds, and having updates built/signed by third‑party package portals.
Attribution and “state‑sponsored” claims
- The project and external researchers label the actor “likely Chinese state‑sponsored”, which:
- Some accept based on targeting, C2 infrastructure, and the project’s prior Taiwan/Uyghur messaging.
- Others see as speculative or potentially propagandistic; false‑flag possibilities and lack of shared technical evidence are noted.
Politics in and around software
- Large subthread debates the Notepad++ maintainer’s history of political release names (Taiwan, Ukraine, Uyghurs):
- One camp wants tools and documentation to be “apolitical” and resents political messaging in editors and utilities.
- Another argues software and open source are inherently political (licensing, censorship, surveillance, war) and that using a popular tool as a protest platform is legitimate.
- Some note that visible political stances can make a project a more tempting target, as here.
- Meta‑discussion about “no politics”:
- Some say asking for “no politics” is itself a political stance that favors the status quo and the already‑privileged.
- Others insist it’s just a preference for topic‑focused spaces and mental respite, not support for any particular side.
Trust, hosting, and alternatives
- Surprise that such a widely used editor relied on shared hosting and weak updater security; several call this “bound to be compromised” eventually.
- Mixed reactions to the post’s tone and the closing “fingers crossed”: some appreciate the honesty; others say it undermines confidence and are dropping Notepad++.
- Alternatives mentioned: Sublime Text, Kate, Gedit, Geany, vim/Neovim, etc.; some will stick with Notepad++, others say the trust is gone.