• Bane_Killgrind@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    26
    ·
    2 days ago

    Expanding on this: the exploit was against their domain name, redirecting selected update requests away from the notepad++ servers. The software itself didn’t validate that the domain actually points to notepad++ servers, and the notepad++ update servers would not see any information that would tell them what was happening.

    Likely they picked some specific developers with a known public IP, and only used this to inject those specific people with malware.