Introduction

State-sponsored attackers compromised Notepad++’s hosting infrastructure from June through December 2025, hijacking the application’s update mechanism to deliver malicious executables to selectively targeted users. The attack did not exploit a vulnerability in Notepad++ code itself but leveraged infrastructure-level access combined with insufficient update verification controls in the WinGUp updater. No CVE has been assigned. All users running versions prior to v8.8.9 who attempted updates during the compromise window should audit systems and update immediately.

Quick Overview

AttributeDetails
CVENone assigned (infrastructure compromise)
SeverityHigh (enables RCE via supply chain)
CWEN/A – not a code vulnerability
Affected ProductsNotepad++ (WinGUp updater component)
Affected VersionsAll versions prior to v8.8.9
Attack vectorNetwork (MitM via compromised infrastructure)
Authentication RequiredNone
Exploit ComplexityHigh (required infrastructure-level access)
User InteractionRequired (user triggers update check)
Active ExploitationYes – confirmed (June–December 2025)
PoC AvailableN/A – infrastructure attack, not reproducible
CISA KEVNo
Fix AvailableYes – v8.8.9+ (recommend v8.9.1)

What is WinGUp?

WinGUp (Windows Generic Update Program) is the built-in update mechanism for Notepad++. When users check for updates, WinGUp contacts notepad-plus-plus.org to retrieve an XML file containing download URLs, then downloads and executes the installer. Compromising this mechanism allows attackers to deliver arbitrary executables to users who trust the legitimate update process.

Technical Analysis

The attack exploited infrastructure-level compromise rather than a software vulnerability. According to the official disclosure from maintainer Don Ho, attackers compromised the shared hosting server where notepad-plus-plus.org was hosted. This allowed them to intercept and selectively redirect update traffic to attacker-controlled servers serving malicious update manifests.

The hosting provider’s incident response statement confirmed the server was directly compromised until September 2, 2025, when a kernel and firmware update severed direct access. However, attackers retained credentials to internal services until December 2, 2025, enabling continued traffic manipulation.

A fundamental weakness in WinGUp enabled the attack: prior to v8.8.9, the updater did not verify the certificate and signature of downloaded installers. Even though v8.8.7 introduced GlobalSign certificate signing and v8.8.8 restricted downloads to GitHub, the updater still did not enforce verification of the downloaded binary’s authenticity.

The attack was highly selective. The hosting provider confirmed attackers specifically searched for the notepad-plus-plus.org domain rather than broadly targeting all hosted clients. Only traffic from certain targeted users was redirected to malicious servers.

Attack Flow

  1. User running vulnerable Notepad++ version checks for updates
  2. WinGUp contacts notepad-plus-plus.org/update/getDownloadUrl.php 
  3. Attackers intercept request and redirect targeted users to malicious server
  4. Malicious server returns update manifest pointing to attacker-controlled binary
  5. WinGUp downloads and executes malicious installer without verification
  6. Attacker achieves code execution with user privileges

Affected Versions

VersionStatusNotes
< v8.8.7VulnerableSelf-signed certificate, no proper verification
v8.8.7VulnerableGlobalSign cert added, but no installer verification
v8.8.8VulnerableDownloads from GitHub only, still no verification
v8.8.9+FixedCertificate and signature verification enforced
v8.9.1CurrentRecommended (self-signed cert removed in v8.9)

Threat Status

Exploitation Activity: Confirmed active exploitation from June through December 2, 2025. Kevin Beaumont reported hearing from “3 orgs now who’ve had security incidents on boxes with Notepad++ installed, where it appears Notepad++ processes have spawned the initial access.” Victims were telecommunications and financial services organizations in East Asia with “hands on keyboard” threat actor activity observed.

PoC Availability: Not applicable. This was an infrastructure-level attack requiring privileged access to hosting infrastructure, not a reproducible software exploit.

Attribution: Kevin Beaumont attributed the campaign to Zirconium (aka Violet Typhoon), a Chinese state-sponsored threat actor. The official Notepad++ disclosure states “multiple independent security researchers have assessed that the threat actor is likely a Chinese state-sponsored group” without naming a specific group. This attribution should be treated as assessed with moderate confidence.

Why This Matters

Notepad++ is one of the most widely deployed text editors globally, particularly among developers and IT professionals. Its widespread use in enterprise environments made the update mechanism a high-value target for intelligence collection operations.

The six-month dwell time demonstrates the stealth of this operation. Users who updated during this period had no indication anything was wrong – the update process appeared completely normal. The selective targeting pattern suggests espionage rather than financial motivation, with attackers specifically pursuing organizations with East Asian business interests.

This incident follows similar supply chain patterns seen in SolarWinds (2020), ASUS ShadowHammer (2019), and CCleaner (2017), highlighting the persistent risk of software update mechanisms as attack vectors.

Remediation

Primary Action: Update to Notepad++ v8.9.1 immediately via manual download from the official website or GitHub releases.

SituationAction
Running version < v8.8.9Update to v8.9.1 via manual download
Updated during June–December 2025Audit system for compromise indicators, then update
Previously installed self-signed certRemove old Notepad++ root certificate from certificate store
Enterprise deploymentConsider centralized package management; block gup.exe network access

Interim Mitigations (if immediate patching not possible):

  • Block WinGUp (gup.exe) network access at firewall level
  • Disable automatic updates in Notepad++ settings
  • Monitor for gup.exe connecting to domains other than notepad-plus-plus.org, github.com, or release-assets.githubusercontent.com

Post-Compromise Considerations

If your organization used Notepad++ with automatic updates enabled between June and December 2025:

  • Review endpoint logs for gup.exe spawning unexpected child processes
  • Check for %Temp%\AutoUpdater.exe or update.exe
  • Look for evidence of: cmd /c netstat -ano >> a.txt, systeminfo >> a.txt, tasklist >> a.txt, whoami >> a.txt
  • Review outbound connections to temp.sh or similar file-sharing services

Detection Guidance

Host-level indicators:

  • gup.exe spawning processes other than explorer.exe and npp* themed installers
  • Files named AutoUpdater.exe or update.exe in %TEMP% (Notepad++ does not use these names)
  • Evidence of reconnaissance commands saving output to a.txt
  • Execution of curl.exe from Notepad++ related processes

Network-level indicators:

  • gup.exe connecting to domains other than notepad-plus-plus.org, github.com, or release-assets.githubusercontent.com
  • Outbound connections to temp.sh (IP: 51.91.79.17) or similar anonymous file-sharing services

How Can Orca Help?

The challenge for security teams isn’t awareness — it’s visibility and prioritization. Which cloud assets are actually running vulnerable Notepad++ versions? Which systems were active during the compromise window? And which of those assets are truly business-critical?

The Orca Cloud Security Platform helps customers identify assets running affected Notepad++ versions across their cloud environments and understand exposure context, including whether systems may have been active during the compromise window and the criticality of each asset. The News Item view highlights impacted assets directly, enabling security teams to prioritize investigation and remediation based on real risk rather than treating every vulnerable installation as equally urgent.