• Bane_Killgrind@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      25
      ·
      2 days ago

      Expanding on this: the exploit was against their domain name, redirecting selected update requests away from the notepad++ servers. The software itself didn’t validate that the domain actually points to notepad++ servers, and the notepad++ update servers would not see any information that would tell them what was happening.

      Likely they picked some specific developers with a known public IP, and only used this to inject those specific people with malware.