Notepad++ confirms its official update system was hijacked to deliver malware. I have confirmed the breach with the project’s lead today. The attack targeted a slice of users over a period of months. This is a classic software supply chain hit, precise and quiet, and it landed inside a widely trusted editor used by millions.
What happened
Attackers gained control of part of the Notepad++ update channel. They used it to push a trojanized update to select machines. The malicious package arrived as a normal update prompt inside the app. Victims clicked update, then got more than a new build.
The project says indicators point to Chinese government linked operators. The activity looks disciplined, not noisy. Only a subset of users saw the tampered update, which helped the attackers stay hidden.

The maintainers have paused affected update paths while they rebuild the pipeline. They are rotating keys, checking mirrors, and auditing logs. New clean installers are being prepared, with fresh signatures and public hashes.
This was a targeted hit. Most users did not receive the bad update, but trust was breached and diligence is required.
How the attack worked
Here is the core of it. The attackers sat where trust is highest, inside the update flow. When the editor checked for a new version, a server under attacker control answered with a poisoned package for selected users. Others received the normal build. That selective delivery reduced alarms.
The payload behaved like a dropper. It installed the editor, then pulled a second stage from a remote host. That second stage varied by target. It likely included system profiling code and a remote access tool.
Technical checks are still ongoing. Early signs suggest the attackers tampered with the update delivery path, not with the source repository. That matters. The code you see on GitHub still matches public commits, but the path that delivered binaries was abused.
The telltales users can check
Look for signature mismatches, or hashes that do not match the official site. Watch for update prompts that feel out of cycle. If Notepad++ asked to run as admin when it usually does not, treat that as a red flag.
If you updated in the last two months and something felt off, stop using that install. Verify it now.
What users should do right now
Take a few minutes and lock this down. Do these steps in order.
- Download the latest installer only from the official Notepad++ site.
- Verify the digital signature and compare the published hash.
- If the signature or hash does not match, uninstall and run a malware scan.
- Disable in app auto update until maintainers complete remediation.
- Check your system startup items and outbound connections for anything unusual.
If you manage a fleet, assume a subset could be affected. Pull endpoint logs, and scan for odd child processes spawned by notepad++.exe. Check for new scheduled tasks added right after an update.
Keep a known good offline copy of your tools. When trust is in doubt, reinstall from that clean baseline, then update from verified sources.
Why this matters for the industry
This attack cuts to the heart of modern software. Every team depends on auto updates, mirrors, and CDNs. Users trust the green button. That trust is now a target. We saw this playbook in past supply chain hits, quiet, selective, patient. The aim is access, not chaos.
Open source projects feel this risk most. They move fast, they run lean, and they serve huge audiences. One hijacked endpoint can flip trust into risk in a single click. Vendors and maintainers need to treat update paths like production crown jewels.
How developers can harden update pipelines
You will not stop every attacker, but you can raise the cost. Focus on the path from source to user, and make each hop verifiable.
- Sign every build with hardware backed keys, and rotate keys on schedule.
- Publish hashes and make users verify by default inside the app.
- Split duties for building, signing, and publishing, with separate creds.
- Add update transparency, log every release to a public ledger.
- Use staged rollouts with anomaly alerts for crash or telemetry spikes.

Treat update servers like bank vaults. Isolate them. Monitor them. Alert on every change, not just big ones. If your editor or client app can verify signatures itself, make it refuse to run unsigned updates, no exceptions.
The bottom line
This was a clean hit on a trusted path. It was narrow, careful, and it worked. The Notepad++ team is moving to contain and clean up. Users should verify now, update only from official links, and keep auto updates off until the all clear. The industry has to meet this moment with stronger update chains, clear signatures, and zero blind trust. The next supply chain attack is already being planned. Let us make it harder to land.
