• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

You are here: Home / General Cyber Security News / Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
February 18, 2026

Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from China to hijack the software update mechanism to selectively deliver malware to targets of interest.

The version 8.9.2 update incorporates what maintainer Don Ho calls a “double lock” design that aims to make the update process “robust and effectively unexploitable.” This includes verification of the signed installer downloaded from GitHub (implemented in version 8.8.9 and later), as well as the newly added verification of the signed XML returned by the update server at notepad-plus-plus[.]org.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


In addition to these enhancements, security-focused changes have been introduced to WinGUp, the auto-updater component –

  • Removal of libcurl.dll to eliminate DLL side-loading risk
  • Removal of two unsecured cURL SSL options: CURLSSLOPT_ALLOW_BEAST and CURLSSLOPT_NO_REVOKE
  • Restriction of plugin management execution to programs signed with the same certificate as WinGUp

Cybersecurity

The update also addresses a high-severity vulnerability (CVE-2026-25926, CVSS score: 7.3) that could result in arbitrary code execution in the context of the running application.

“An Unsafe Search Path vulnerability (CWE-426) exists when launching Windows Explorer without an absolute executable path,” Ho said. “This may allow execution of a malicious explorer.exe if an attacker can control the process working directory. Under certain conditions, this could lead to arbitrary code execution in the context of the running application.”

The development comes weeks after Notepad++ disclosed that a breach at the hosting provider level enabled threat actors to hijack update traffic starting June 2025 and redirect requests from certain users to malicious servers to serve a poisoned update. The issue was detected in early December 2025.

According to Rapid7 and Kaspersky, the tampered updates enabled the attackers to deliver a previously undocumented backdoor dubbed Chrysalis. The supply chain incident, tracked under the CVE identifier CVE-2025-15556 (CVSS score: 7.7), has been attributed to a China-nexus hacking group called Lotus Panda.

Notepad++ users are recommended to update to version 8.9.2, and make sure that the installers are downloaded from the official domain.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «cisa flags four security flaws under active exploitation in latest CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
  • CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update
  • Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
  • Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates
  • SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer
  • Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
  • My Day Getting My Hands Dirty with an NDR System
  • Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations
  • Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta
  • Infostealer Steals OpenClaw AI Agent Configuration Files and Gateway Tokens

Copyright © TheCyberSecurity.News, All Rights Reserved.