Suspected Chinese Hackers Hijack Notepad++ Updates in Daring Supply Chain Strike
State-sponsored attackers, believed to be from China, compromised Notepad++’s shared hosting server to hijack its update mechanism. They intercepted traffic headed to the official notepad-plus-plus.org site, potentially delivering malware to millions of users worldwide.
The Nitty-Gritty Details
Notepad++ maintainer Don Ho confirmed the breach on Monday, revealing how attackers redirected update traffic from the project’s legitimate domain. This supply chain attack targeted one of the most popular code editors out there, with over 100 million downloads historically. No specific CVE was assigned yet, but the method mirrors classic tactics like those seen in SolarWinds—straight server compromise without touching the code repo itself. Meanwhile, related headlines include Russian Fancy Bear exploiting CVE-2026-21509 in Microsoft Office post-emergency patch, and ransomware gangs hitting VMware ESXi via CVE-2025-22225 and SmarterMail’s CVE-2026-24423, both now on CISA’s Known Exploited Vulnerabilities list.
Why Devs Should Sweat This
If you’re a developer, Notepad++ is probably on your machine right now—lightweight, syntax-highlighting magic for quick edits. A hijacked update means instant malware on your dev box, from keyloggers to ransomware lockers, turning your daily driver into an attack vector. Supply chain hits like this bypass all your antivirus and force you to question every auto-update; patch your habits now or risk your codebase, creds, and sanity.
Final Take
Supply chain attacks are the new normal—verify your tools, enable update signing checks, and maybe diversify your editor stack. Stay vigilant; the hackers aren’t slowing down.

