this post was submitted on 10 Dec 2025
341 points (96.2% liked)

Technology

77589 readers
2785 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
all 47 comments
sorted by: hot top controversial new old
[–] ren@reddthat.com 16 points 1 day ago

Until version 8.8.7 of Notepad++, the developer used a self-signed certificate, which is available in the Github source code. This made it possible to create manipulated updates and push them onto victims, as binaries signed this way cause a warning „Unknown Publisher“. Since v8.8.7, however, Notepad++ relies on a legitimate GlobalSign certificate, and installing its own Notepad++ root certificate is no longer necessary – if such a warning pops up, users should be alarmed.

I don't understand how this is relevant. Unless the attacker has either

(a) somehow acquired the private key of the cert

(b) replaced the cert delivered through the installer

A self signed cert isn't any worse. Both of these attack vectors still work with a public root CA. Or maybe notepad++ just forgot to validate the self signed cert against the one they delivered through their sources, just accepting any non-expired cert? That's just a bug.

[–] smeg@infosec.pub 185 points 1 day ago* (last edited 1 day ago) (1 children)

tl;dr A network operator can perform a MitM attack on the built-in updater's call-out checking for updates by faking the Notepad++ update website, telling it a new version is available at and then downloading and running the malware

It requires a malicious network operator, or preexisting malware on the host.

[–] HaraldvonBlauzahn@feddit.org 32 points 1 day ago

I would doubt that the average self-updating Windows program has better security.

[–] LastYearsIrritant@sopuli.xyz 163 points 2 days ago (1 children)

https://notepad-plus-plus.org/news/v889-released/

Since you have to opt into tracking to read the article (which I think is illegal) here's the source.

[–] muusemuuse@sh.itjust.works 8 points 1 day ago (1 children)

One of the few moments safari is the easier option…

-tap hide distracting items -tap the bullshit banner -it blows away dramatically

[–] 9bananas@feddit.org 6 points 1 day ago

ublock has the same function; it's the thunderbolt icon, which let's you just zap away whatever html element offends you!

...no fancy animation tho...is there a plugin that animates the ublock zapper? that would be very fun!

[–] rowdy@piefed.social 118 points 2 days ago (1 children)

we share data with our 188 partners

That’s a no from me dawg

The updater integrated into Notepad++ has allowed itself to be infiltrated by malware, which has been installed on some PCs. The developer of the powerful open-source text editor is responding with an update to Notepad++ v8.8.9. Users currently have to perform the update manually.

In a news post on the Notepad++ website, developer Don Ho explains that "some security experts have reported incidents where internet traffic affecting Notepad++ was intercepted." According to the post, investigations have revealed that traffic from the Notepad++ updater WinGUp "was occasionally redirected to malicious servers, leading to the download of compromised executable files." IT security researcher Kevin Beaumont reports that at least three organizations "with interests in South Asia" have been targeted in this way.

As Beaumont explains, the updater uses a version check that queries the URL "https://notepad-plus-plus.org/update/getDownloadUrl.php" and evaluates an XML file delivered through it. The updater uses the download URL listed in the XML file, saves the file in the %TEMP% folder, and executes it. Anyone who can intercept and manipulate this traffic can therefore change the download URL. Until version 8.8.7 of Notepad++, the developer used a self-signed certificate, which is available in the Github source code. This made it possible to create manipulated updates and push them onto victims. Since v8.8.7, however, Notepad++ relies on a legitimate GlobalSign certificate, and installing its own Notepad++ root certificate is no longer necessary.

Remedy through updates

With Notepad++ v8.8.8, the WinGUp updater now forces github.com as the download source. Version 8.8.9, released overnight on Wednesday, further hardens Notepad++ and WinGUp so that they correctly check the signature and certificates of downloaded installers during the update process. If the check fails, the update process is aborted. Don Ho notes that investigations are ongoing to determine how the traffic hijacking occurred in the observed cases.

Kevin Beaumont also lists some indicators of compromise (IOCs). For example, connections from "gup.exe" to URLs other than "notepad-plus-plus.org", "github.com", and "release-assets.githubusercontent.com" are suspicious. Likewise, attention should be paid if "gup.exe" starts unusual processes – only "explorer.exe" and "npp*" related Notepad++ installers should run under it, which since versions 8.8.8 are also signed with a GlobalSign certificate. After the observed attacks, files named "update.exe" or "AutoUpdater.exe" (Notepad++ itself does not use these names at all) were apparently also found in the user's TEMP directory, from which "gup.exe" downloaded and executed the updaters.

Notepad++ 8.8.8 does not find the update yet

Notepad++ v8.8.8 currently does not find the update.

Beaumont recommends updating to at least Notepad++ v8.8.8. However, version 8.8.9 is even further hardened. The integrated updater from Notepad++ v8.8.8 does not yet find the update, and "winget" also does not currently find a newer software version. However, the latest version is available as a manual download on the Notepad++ website.

Notepad++ is frequently targeted by malicious actors because the software is popular and widely used. Last year, for example, Don Ho asked for help to get rid of a "parasitic website" that was creeping into the original Notepad++ site in Google search results. It had unscrupulous intentions. In general, fake sites often appear in search results offering virus-infected files.

Jetzt heise security PRO entdecken

(dmk)

This article was originally published inGerman. It was translated with technical assistance and editorially reviewed before publication.

[–] floofloof@lemmy.ca 52 points 2 days ago (2 children)

Until version 8.8.7 of Notepad++, the developer used a self-signed certificate, which is available in the Github source code.

That doesn't sound wise.

[–] techt@lemmy.world 8 points 1 day ago (1 children)
[–] sem@piefed.blahaj.zone 4 points 1 day ago* (last edited 1 day ago) (1 children)

2025-07-09 **“Sometimes, when one door closes (lack of code signing) in life, another one opens (vulnerability) .”\

The sentence sumarizes well the situation in the previous version, 8.8.2.

There were - and still are - many false-positives reported in the previous version v8.8.2, by the antivirus software due to the absence of Windows code signing certificate.


1. ~~Double-click the certificate, it may tell you it’s invalid, ignore that and click: \*\*“Install Certificate..”~~\*\*~~.~~
2. ~~In the Certificate Import Wizard, select \*\*“Local Machine”~~**\~\~, then click \~\~**~~Next~~\*\*~~.~~
3. ~~If prompted by UAC (optional, depending on admin Previleges), click ~~**~~Yes~~**~~.~~
4. ~~Choose \*\*“Place all certificates in the following store”~~**\~\~, then browse and select \~\~**~~“Trusted Root Certification Authorities”~~**\~\~. Click \~\~**~~Next~~\*\*~~.~~
5. ~~On the final page of the wizard, click~~ **~~Finish~~** ~~to complete the installation.For detailed instructions, see Notepad++ User Manual.~~

We’re still trying to obtain a certificate issued by conventional Certificate Authorities, for a better user experience. But let’s be honest: it’s probably not happening. Notepad++ isn’t a business - it’s certainly not an enterprise - and apparently, that makes a popular open-source project invisible to their gatekeeping standards.

If the “gatekeepers” won’t issue a certificate under the name we deserve - so be it. At least it spares us from wasting time and energy on a frustrting process that demands we [beg for a new certificate every 3 years](https://notepad-plus-plus.org/news/v764-released/). The Notepad++ Root Certificate may not carry their approval, but it leads us to freedom.

***Edit (2025-12-03): Starting with v8.8.7, Notepad++ binaries - including the installer - are digitally signed using a legitimate certificate issued by GlobalSign. As a result, Installation of the Notepad++ root certificate is no longer required. We recommend that users who have previously installed the root certificate remove it.***
[–] sem@piefed.blahaj.zone 3 points 1 day ago (2 children)

I give up trying to fix the formatting. I had it right, but then adding the image, fucked everything up again, and now blorp crashes when I try to edit it again.

I guess this will be one of the rare cases when you do have to read the article in order to be informed instead of just the comments.

[–] Redjard@lemmy.dbzer0.com 5 points 1 day ago (2 children)

I cleaned it up. Your editor doesn't like to nest formatting apparently. Using an editor that lets you write the markdown directly is probably better, and you are probably already familiar with markdown anyway, since it's used all over the place.

2025-07-09 “Sometimes, when one door closes (lack of code signing) in life, another one opens (vulnerability).”

The sentence sumarizes well the situation in the previous version, 8.8.2.

There were - and still are - many false-positives reported in the previous version v8.8.2, by the antivirus software due to the absence of Windows code signing certificate. ~~How to install the root certificate:~~

  1. ~~Double-click the certificate, it may tell you it’s invalid, ignore that and click: “Install Certificate..”.~~
  2. ~~In the Certificate Import Wizard, select “Local Machine”, then click Next.~~
  3. ~~If prompted by UAC (optional, depending on admin Previleges), click Yes.~~
  4. ~~Choose “Place all certificates in the following store”, then browse and select “Trusted Root Certification Authorities”. Click Next.~~
  5. ~~On the final page of the wizard, click~~ ~~Finish~~ ~~to complete the installation.For detailed instructions, see Notepad++ User Manual.~~

We’re still trying to obtain a certificate issued by conventional Certificate Authorities, for a better user experience. But let’s be honest: it’s probably not happening. Notepad++ isn’t a business - it’s certainly not an enterprise - and apparently, that makes a popular open-source project invisible to their gatekeeping standards.

If the “gatekeepers” won’t issue a certificate under the name we deserve - so be it. At least it spares us from wasting time and energy on a frustrting process that demands we beg for a new certificate every 3 years. The Notepad++ Root Certificate may not carry their approval, but it leads us to freedom.

Edit (2025-12-03): Starting with v8.8.7, Notepad++ binaries - including the installer - are digitally signed using a legitimate certificate issued by GlobalSign. As a result, Installation of the Notepad++ root certificate is no longer required. We recommend that users who have previously installed the root certificate remove it.

[–] sem@piefed.blahaj.zone 1 points 21 hours ago

Thank you kind stranger

[–] moseschrute@lemmy.world 1 points 22 hours ago* (last edited 22 hours ago)

Blorp lets you edit markdown directly. Theres an icon button to switch to the raw markdown editor (look for the M⬇️ icon). I assume you’re not using Blorp, but for anyone else reading this.

[–] moseschrute@lemmy.world 1 points 22 hours ago (1 children)

Blorp dev here. I would love to fix this bug. If there’s any chance you could type out instructions to recreate the crash, I’ll get this fixed ASAP.

[–] sem@piefed.blahaj.zone 2 points 22 hours ago (1 children)

Thanks! Here's how you can try to replicate it:

  1. Be on Android, with IronFox as the browser
  2. Reply to this comment: https://piefed.blahaj.zone/post/453110#comment_2488545
  3. Go to this website https://notepad-plus-plus.org/news/v883-self-signed-certificate/
  4. Select the text starting with 2025-07-09 and ending with We recommend that users who have previously installed the root certificate remove it.
  5. Switch back to Blorp, and start your comment with a > Blorp automatically converted this into a quote block. Everything is good so far
  6. Paste the formatted text from the webpage. Notice that there are some problems converting the formatted text into markdown: strikethroughs are inconsistent, codeblocks are present when none exist in the copied text, etc.,
  7. Switch to editing markdown mode in the bottom right corner
  8. Clean up the formatting -- remove the code blocks, clean up the strikethroughs so they match the website
  9. Save the image from the notepad++ website
  10. Switch back to visual mode
  11. Place the cursor where the image should go, put in a few line breaks (should still be within the nested quote)
  12. Upload the image
  13. Blorp becomes unresponsive
  14. Closing and reopening the app gets it responsive again, but it goes unresponsive any time you edit that comment.

Let me know if this helps of if you have any advice for how to make bug reports!

[–] moseschrute@lemmy.world 1 points 19 hours ago* (last edited 19 hours ago)

Idk if you have professional experience writing tickets, but this is very well written. Most people just write “the screen is blank” lol. It will take me a little time to dig into this, but that you for the instructions!

[–] asbestos@lemmy.world 16 points 1 day ago (1 children)

So the private key was left in the Github source code and nobody caught it? Or was it the public key? (which makes this statement way less impactful)

[–] Samskara@sh.itjust.works 12 points 1 day ago

Private key probably. Only the public key is not enough to sign the package.

[–] Kazumara@discuss.tchncs.de 14 points 1 day ago* (last edited 1 day ago) (1 children)

I don't get how this was exploited in practise.

Even if the signatures on the downloaded packages weren't checked properly, how would you modify the content of the XML file returned from https://notepad-plus-plus.org/update/getDownloadUrl.php?version=8.8.0 ? For that you'd have to break or MITM the TLS too, no?

The usual case for TLS MITM is when a company decides DPI is more important than E2E encryption and they terminate all TLS on the firewall, but if the firewall is compromised there would be much easier avenues of entry other than notepad++

[–] SteveTech@aussie.zone 5 points 1 day ago

Maybe it was used as some sort of privilege escalation? E.g. NP++ downloads an XML file to %TEMP%, some already present malware modifies it, then GUP downloads a payload and executes it with administrator permissions.

[–] flamiera@kbin.melroy.org 40 points 2 days ago

OP, if people have to do the work for you in posting sources, consider this a learning lesson as to what not to do.

[–] daggermoon@lemmy.world 2 points 1 day ago

I have it installed in Wine, I haven't updated it in months though.

[–] theherk@lemmy.world 25 points 2 days ago (1 children)

Not accessible without accepting advertising cookies, like Healthline.

[–] floquant@lemmy.dbzer0.com 11 points 1 day ago (1 children)

Zap the overlay with uBlock

But yeah fuck the author and everyone else using the "pay or be tracked" scheme. If you want to show ads to non subscribers, fine. But there's no reason to require tracking users to do so - if non-tracked ads are less profitable, take it up with the ad networks.

[–] theherk@lemmy.world 5 points 1 day ago

Agreed in all accounts. I do use ublock on my laptop but not on mobile.

[–] floofloof@lemmy.ca 12 points 2 days ago
[–] village604@adultswim.fan 10 points 1 day ago (1 children)

It's a bit concerning that neither the article or Notepad++s blog post say what the affected version is, or what the minimum safe version is.

I'm assuming the minimum version is 8.8.7 since that's when they moved away from self signed certs, but it would be nice to hear it from the horse's mouth.

[–] Jakeroxs@sh.itjust.works 7 points 1 day ago (1 children)
[–] village604@adultswim.fan 4 points 1 day ago

Yes, I did.

8.8.9 is the fully hardened version, but the 8.8.7 update should have fixed the vulnerability since from what I can tell the publicly available self signed cert was being used for the exploit.

[–] SnotFlickerman@lemmy.blahaj.zone 9 points 1 day ago* (last edited 1 day ago) (1 children)

This isn't the first time Notepad++ was compromised. if I recall correctly, the first time was by a CIA backdoor.

https://notepad-plus-plus.org/news/v733-fix-cia-hacking-npp-issue/

That doesn't really have anything to do with notepad++ in particular though. I don't think it's typical for programs to be running checks on the integrity of dll files.

[–] JTskulk@lemmy.world 4 points 1 day ago (1 children)

The updater for the open-source editor Notepad++ has installed malware on WINDOWS PCs. The Linux ecosystem doesn't allow for this kind of network attack because of signing.

[–] funkless_eck@sh.itjust.works 37 points 1 day ago (2 children)

np++ isn't on Linux I thought

[–] Muehe@lemmy.ml 4 points 1 day ago

There are quite a lot of packages running it through wine, on AUR, as snap/flatpak, and probably more I didn't see in my cursory search. So the question is does this exploit work on wine I guess.

[–] bryndos@fedia.io 2 points 1 day ago

yeah there was 'notepadqq', but its not the same as ++.

[–] SculptusPoe@lemmy.world 6 points 1 day ago* (last edited 1 day ago)

I just updated through Ninite and it went to 8.8.9.

Huh. Notepad++ is only for Windows?

I used to use EditPad when I used Windows. There was something that royally pissed me off about it, but I can't recall now. I know there was kind of a shenanigans with the name. EditPad Lite was free and there was an EditPad Pro, but IIRC the free one was just fine for most people (and I do believe in paying for software you enjoy using). I dunno, it did something, but now, mostly I just remember it being very good.

I have a Mac now and we have TextEdit. It's never made me want more from a notepad app. Notepad used to suck in Windows. We have it at work and I quite like it. It has Markdown support, but you can disable that if you want. It also has Copilot AI in it, but that can also be disabled. It has Dark Mode which is pretty much all I wanted from my notepad app. I actually quite like my Windows 11 setup at work, but I like my Macs at home a bit better. I also know I don't have much room to criticise Windows if I'm not running Linux, and there's no point in bragging about Linux from a Mint or Ubuntu installation; these days you kinda have to use Arch (which you built from source) to really call yourself a Linux user. The rest of us are just plebeians.

Of course if you're using N++ as an IDE, that's different. I don't even want line numbers (visual distraction).