• dindonmasker@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    1
    ·
    3 days ago

    I would like to know starting from wich version should i be concerned. I haven’t updated in a while i think.

    • MangoCats@feddit.it
      cake
      link
      fedilink
      English
      arrow-up
      11
      ·
      3 days ago

      The timeline says the attack started in June of 2025 and continued through Dec 2, 2025. If you installed, updated, or silently updated during that period you may have been targeted / compromised.

      • how_we_burned@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 days ago

        How would you know if you updated?

        My notepad++ is on 8.9.1 and I have no idea how it’s on that ver (ninite I think is where I sourced it…maybe it’s auto updating?)

        • MangoCats@feddit.it
          cake
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 days ago

          Odds are you weren’t on the “targeted list”.

          If you don’t know, you’re probably auto updating.

          If you updated or installed in 2025 after June-ish, the safe thing to do is uninstall, then download from the new (theoretically more secure) website and install the new (theoretically more secure) 8.9.1.

          If you were pwned by an update during later 2025, they could disguise just about anything in your Notepad++ and its associated files - make it look perfectly normal, make it act perfectly normal, but have their own malware on your system doing… whatever it is they want it to do.

          I understand one of the things they were doing is running a proxy to carry traffic through your system, so if you see a lot of unexpected network activity (under Windoze how can you tell?) you may have been compromised. But that’s not the only thing they could have done, nobody has really analyzed the attack yet and even after they do, you might have gotten a “special” payload that the analysis team didn’t see…

          • floofloof@lemmy.ca
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 day ago

            the safe thing to do is uninstall, then download from the new (theoretically more secure) website and install the new (theoretically more secure) 8.9.1.

            That won’t rescue your system if it is already compromised though. It will just prevent it from being newly compromised in this manner.

            • MangoCats@feddit.it
              cake
              link
              fedilink
              English
              arrow-up
              2
              ·
              edit-2
              1 day ago

              True, but in this case it seems worth doing due to the relatively patient, selective nature of the attack - it would at least clean out a compromised Notepad++ if it had not spread to a wider system compromise yet.

          • how_we_burned@lemmy.zip
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 day ago

            Unfortunately i do work for a targeted company (we do a lot of secret squirrel stuff) in south East Asia.

            We get a lot of attacks.

            I was looking at the attack and malware they inject (there is a blog post link on the notepad++ notice) which pointed out how the attack worked. Apparently they run a service called bluetoothservice.exe. I didn’t see anything like that or any the other stuff they said gets created.

            But then again finding malware isn’t my bag so who knows.

            Pretty sure my updates came via nanite installer so I’m hoping I wasn’t targeted.

    • Kissaki@feddit.org
      link
      fedilink
      English
      arrow-up
      5
      ·
      3 days ago

      Every version before the previous one.

      If you haven’t updated you were not vulnerable to the update hijacking.