• HeyJoe@lemmy.world
    link
    fedilink
    English
    arrow-up
    32
    ·
    9 hours ago

    Yikes… i guess i am confused though. What data was being sent through this channel? What did they get from people while it happened and why did it take 2 months past them stopping it to finally make a release? I love the app, but this sounds really bad.

    • Kissaki@feddit.org
      link
      fedilink
      English
      arrow-up
      4
      ·
      3 hours ago

      The previous release already fixed this, or evaded the issue.

      The channel was the update mechanism. Upon Notepad++ checking for updates, they were able to inject their own. So if you updated via the apps own update checker they could have misdirected you into installing something else or something modified.

    • Elvith Ma'for@feddit.org
      link
      fedilink
      English
      arrow-up
      49
      ·
      9 hours ago

      From my understanding: Basically the attackers could reply to your version check request (usually done automatically) and tell N++ that there were a new version available. If you then approved the update dialogue, N++ would download and execute the binary from the update link that the server sent you. But this didn’t necessarily need to be a real update, it could have been any binary since neither the answer to the update check nor the download link were verified by N++

      • HeyJoe@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        edit-2
        7 hours ago

        Thats what i was thinking, but there is no mention on if this did happen and if it did what was compromised or allowed to happen.

          • Bane_Killgrind@lemmy.dbzer0.com
            link
            fedilink
            English
            arrow-up
            11
            ·
            6 hours ago

            Expanding on this: the exploit was against their domain name, redirecting selected update requests away from the notepad++ servers. The software itself didn’t validate that the domain actually points to notepad++ servers, and the notepad++ update servers would not see any information that would tell them what was happening.

            Likely they picked some specific developers with a known public IP, and only used this to inject those specific people with malware.

              • MangoCats@feddit.it
                link
                fedilink
                English
                arrow-up
                1
                ·
                47 minutes ago

                That’s what they say they rolled out, after: “Within Notepad++ itself, WinGup (the updater) was enhanced in v8.8.9 to verify both the certificate and the signature of the downloaded installer”

                  • Kissaki@feddit.org
                    link
                    fedilink
                    English
                    arrow-up
                    2
                    ·
                    3 hours ago

                    It’s not game over regardless if the updater checks a signature of the update installer. Them it wouldn’t run an installer by someone else.