• HeyJoe@lemmy.world
    link
    fedilink
    English
    arrow-up
    17
    arrow-down
    1
    ·
    2 days ago

    Thats what i was thinking, but there is no mention on if this did happen and if it did what was compromised or allowed to happen.

      • Bane_Killgrind@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        26
        ·
        2 days ago

        Expanding on this: the exploit was against their domain name, redirecting selected update requests away from the notepad++ servers. The software itself didn’t validate that the domain actually points to notepad++ servers, and the notepad++ update servers would not see any information that would tell them what was happening.

        Likely they picked some specific developers with a known public IP, and only used this to inject those specific people with malware.