• Elvith Ma'for@feddit.org
    link
    fedilink
    English
    arrow-up
    55
    arrow-down
    1
    ·
    11 hours ago

    From my understanding: Basically the attackers could reply to your version check request (usually done automatically) and tell N++ that there were a new version available. If you then approved the update dialogue, N++ would download and execute the binary from the update link that the server sent you. But this didn’t necessarily need to be a real update, it could have been any binary since neither the answer to the update check nor the download link were verified by N++

    • HeyJoe@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      10 hours ago

      Thats what i was thinking, but there is no mention on if this did happen and if it did what was compromised or allowed to happen.

        • Bane_Killgrind@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          14
          ·
          9 hours ago

          Expanding on this: the exploit was against their domain name, redirecting selected update requests away from the notepad++ servers. The software itself didn’t validate that the domain actually points to notepad++ servers, and the notepad++ update servers would not see any information that would tell them what was happening.

          Likely they picked some specific developers with a known public IP, and only used this to inject those specific people with malware.

            • MangoCats@feddit.it
              link
              fedilink
              English
              arrow-up
              2
              ·
              3 hours ago

              That’s what they say they rolled out, after: “Within Notepad++ itself, WinGup (the updater) was enhanced in v8.8.9 to verify both the certificate and the signature of the downloaded installer”

                • Kissaki@feddit.org
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  6 hours ago

                  It’s not game over regardless if the updater checks a signature of the update installer. Them it wouldn’t run an installer by someone else.