• Bane_Killgrind@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    14
    ·
    9 hours ago

    Expanding on this: the exploit was against their domain name, redirecting selected update requests away from the notepad++ servers. The software itself didn’t validate that the domain actually points to notepad++ servers, and the notepad++ update servers would not see any information that would tell them what was happening.

    Likely they picked some specific developers with a known public IP, and only used this to inject those specific people with malware.

      • MangoCats@feddit.it
        link
        fedilink
        English
        arrow-up
        2
        ·
        4 hours ago

        That’s what they say they rolled out, after: “Within Notepad++ itself, WinGup (the updater) was enhanced in v8.8.9 to verify both the certificate and the signature of the downloaded installer”

          • Kissaki@feddit.org
            link
            fedilink
            English
            arrow-up
            2
            ·
            6 hours ago

            It’s not game over regardless if the updater checks a signature of the update installer. Them it wouldn’t run an installer by someone else.

              • Elvith Ma'for@feddit.org
                link
                fedilink
                English
                arrow-up
                2
                ·
                5 hours ago

                As the hoster wrote this:

                we immediately transferred all clients’ web hosting subscriptions from this server

                It looks like the binaries and the update check script were put on a simple web space. If that is the correct conclusion to draw from this excerpt, then it’d be rather strange to have the keys on that server as it’s very unlikely that it was used to produce any builds.