WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

470

Archive: https://archive.today/JvrTW

From the post:

>Chinese state-sponsored threat actors were likely behind the hijacking of Notepad++ update traffic last year that lasted for almost half a year, the developer states in an official announcement today. The attackers intercepted and selectively redirected update requests from certain users to malicious servers, serving tampered update manifests by exploiting a security gap in the Notepad++ update verification controls. A statement from the hosting provider for the update feature explains that the logs indicate that the attacker compromised the server with the Notepad++ update application.

Archive: https://archive.today/JvrTW From the post: >>Chinese state-sponsored threat actors were likely behind the hijacking of Notepad++ update traffic last year that lasted for almost half a year, the developer states in an official announcement today. The attackers intercepted and selectively redirected update requests from certain users to malicious servers, serving tampered update manifests by exploiting a security gap in the Notepad++ update verification controls. A statement from the hosting provider for the update feature explains that the logs indicate that the attacker compromised the server with the Notepad++ update application.
[–] 1 pt

As long as Emacs isn't affected.

[–] 1 pt

I thought Notepad++ had been abandoned a couple years ago because parts of the update code were completely hackable.