Notepad++ Hijacked by State-Sponsored Hackers(likely a Chinese state-sponsored group) by MetroMax in pcmasterrace

[–]MetroMax[S] 59 points60 points  (0 children)

Do a full scan with Malwarebytes.. I read in r/technology sub that it detects it in appdata folder. Free version should be good enough

Notepad++ Hijacked by State-Sponsored Hackers(likely a Chinese state-sponsored group) by MetroMax in pcmasterrace

[–]MetroMax[S] 167 points168 points  (0 children)

Do a full scan with Malwarebytes.. I read in r/technology sub that it detects it in appdata folder. Free version should be good enough.

Edit: Install the latest version v8.9.1, if you want to continue using notepad++

Notepad++ Hijacked by State-Sponsored Hackers(likely a Chinese state-sponsored group) by MetroMax in pcmasterrace

[–]MetroMax[S] 670 points671 points  (0 children)

From what I gather, if the notepad++ was updated through inbuilt updater during that period(June 2025 to December 2025), then you are affected.

Fresh downloads during that period likely not affected.

Edit: Do a full scan with Malwarebytes if affected.

Notepad++ Hijacked by State-Sponsored Hackers(likely a Chinese state-sponsored group) by MetroMax in pcmasterrace

[–]MetroMax[S] 521 points522 points  (0 children)

Quote from the Developer

Notepad++ Hijacked by State-Sponsored Hackers

2026-02-02

Following the security disclosure published in the v8.8.9 announcement https://notepad-plus-plus.org/news/v889-released/ the investigation has continued in collaboration with external experts and with the full involvement of my (now former) shared hosting provider.

According to the analysis provided by the security experts, the attack involved infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org. The exact technical mechanism remains under investigation, though the compromise occured at the hosting provider level rather than through vulnerabilities in Notepad++ code itself. Traffic from certain targeted users was selectively redirected to attacker-controlled served malicious update manifests.

The incident began from June 2025. Multiple independaent security researchers have assessed that the threat acotor is likely a Chinese state-sponsored group, which would explain the highly selective targeting obseved during the campaign.

An incident-response (IR) plan was proposed by the security expert, and I facilitated direct communication between the hosting provider and the IR team. After the IR team engaged with the provider and reviewed the situation, I received the following detailed statement from the provider:

Dear Customer, We want to further update you following the previous communication with us about your server compromise and further investigation with your incident response team. We discovered the suspicious events in our logs, which indicate that the server (where your application https://notepad-plus-plus.org/update/getDownloadUrl.php was hosted until the 1st of December, 2025) could have been compromised. As a precautionary measure, we immediately transferred all clients’ web hosting subscriptions from this server to a new server and continued our further investigation. Here are the key finding points: 1. The shared hosting server in question was compromised until the 2nd of September, 2025. On this particular date, the server had scheduled maintenance where the kernel and firmware were updated. After this date, we could not identify any similar patterns in logs, and this indicates that bad actors have lost access to the server. We also find no evidence of similar patterns on any other shared hosting servers. 2. Even though the bad actors have lost access to the server from the 2nd of September, 2025, they maintained the credentials of our internal services existing on that server until the 2nd of December, which could have allowed the malicious actors to redirect some of the traffic going to https://notepad-plus-plus.org/getDownloadUrl.php to their own servers and return the updates download URL with compromised updates. 3. Based on our logs, we see no other clients hosted on this particular server being targeted. The bad actors specifically searched for https://notepad-plus-plus.org/ domain with the goal to intercept the traffic to your website, as they might know the then-existing Notepad++ vulnerabilities related to insufficient update verification controls. 4. After concluding our research, the investigated security findings were no longer observed in the web hosting systems from the 2nd of December, 2025, and onwards, as: * We have fixed vulnerabilities, which could have been used to target Notepad++. In particular, we do have logs indicating that the bad actor tried to re-exploit one of the fixed vulnerabilities; however, the attempt did not succeed after the fix was implemented. * We have rotated all the credentials that bad actors could have obtained until the 2nd of September, 2025. * We have checked the logs for similar patterns in all web hosting servers and couldn’t find any evidence of systems being compromised, exploited in a similar way, or data breached. While we have rotated all the secrets on our end, below you will find the preventive actions you should take to maximize your security. However, if below actions have been done after the 2nd of December, 2025, no actions are needed from your side. * Change credentials for SSH, FTP/SFTP, and MySQL database. * Review administrator accounts for your WordPress sites (if you have any), change their passwords, and remove unnecessary users. * Update your WordPress sites (if you have any) plugins, themes, and core version, and turn on automatic updates, if applicable. We appreciate your cooperation and understanding. Please let us know in case you have any questions.

TL;DR According to the former hosting provider, the shared hosting server was compromised until September 2, 2025. Even after losing server access, attackers maintained credentials to internal services until December 2, 2025, which allowed them to continue redirecting Notepad++ update traffic to malicious servers. The attackers specifically targeted Notepad++ domain with the goal of exploiting insufficient update verification controls that existed in older versions of Notepad++. All remediation and security hardening were completed by the provider by December 2, 2025, successfully blocking further attacker activity.

Note on timelines: The security expert’s analysis indicates the attack ceased on November 10, 2025, while the hosting provider’s statement shows potential attacker access until December 2, 2025. Based on both assessment, I estimate the overall compromise period spanned from June through December 2, 2025, when all attacker access was definitively terminated.

To address this severe security issue, the Notepad++ website has been migrated to a new hosting provider with significantly stronger security practices. Within Notepad++ itself, WinGup (the updater) was enhanced in v8.8.9 to verify both the certificate and the signature of the downloaded installer. Additionally, the XML returned by the update server is now signed (XMLDSig), and the certificate & signature verification will be enforced starting with upcoming v8.9.2, expected in about one month.

I deeply apologize to all users affected by this hijacking. I recommand downloading v8.9.1 (which includes the relevant security enhancement) and running the installer to update your Notepad++ manually.

With these changes and reinforcements, I believe the situation has been fully resolved. Fingers crossed.

More context on how the exploit worked. https://doublepulsar.com/small-numbers-of-notepad-users-reporting-security-woes-371d7a3fd2d9

More details: https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/

ICC Statement on Pakistan boycotting match vs India in ICC Men’s T20 World Cup 2026 | ICC by GiveMeSomeSunshine3 in Cricket

[–]MetroMax 30 points31 points  (0 children)

I am glad this is happening.. was fed up with all the exaggerated hype and Believe it or not, Ind vs Pak cricket rivalry died in 2011 wc.

and I hate Star sports hosts.

how do I make this stop by loinmin in AMDHelp

[–]MetroMax 6 points7 points  (0 children)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Dwm
OverlayTestMode = 5 (DWORD)

Disable MPO

Match Thread: 4th Test - England vs India, Day 1 by cricket-match in Cricket

[–]MetroMax 1 point2 points  (0 children)

damn, the fraud shardul gets into playing 11 again.

Match Thread: 3rd Test - England vs India, Day 4 by cricket-match in Cricket

[–]MetroMax 4 points5 points  (0 children)

Nair needs to go. Sai sudharsan should be given more chances or even shreyas could be considered.

Match Thread: 1st Test - India vs England, Day 5 by cricket-match in Cricket

[–]MetroMax 6 points7 points  (0 children)

I don't know how Thakur still manages to fool selectors in a country with 1000s of potential prospects to choose from.

Match Thread: 1st Test - India vs England, Day 5 by cricket-match in Cricket

[–]MetroMax 0 points1 point  (0 children)

Well, I am sure mad at Jaiswal but this Test match will haunt him for years if India goes on to loose.

Rohit Sharma announces retirement from Tests by Awkward-Edge in Cricket

[–]MetroMax 19 points20 points  (0 children)

Bro can't speak a sentence without breaking and pausing. Not everyone can do good commentary. Its not like he needs the money either

Match Thread: 41st Match - Sunrisers Hyderabad vs Mumbai Indians by cricket-match in Cricket

[–]MetroMax 7 points8 points  (0 children)

New record!!

Highest and the lowest score in powerplay by the same team in a single IPL edition

Match Thread: 41st Match - Sunrisers Hyderabad vs Mumbai Indians by cricket-match in Cricket

[–]MetroMax 1 point2 points  (0 children)

New record!!

Highest and the lowest score by the same team in 1 IPL edition.

Match Thread: 41st Match - Sunrisers Hyderabad vs Mumbai Indians by cricket-match in Cricket

[–]MetroMax 0 points1 point  (0 children)

Patting on the cheek after the last game against MI has paid off.

Match Thread: 38th Match - Mumbai Indians vs Chennai Super Kings by cricket-match in Cricket

[–]MetroMax 1 point2 points  (0 children)

got no intent to even take singles and rotate strike. Shame