• Bane_Killgrind@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      11
      ·
      6 hours ago

      Expanding on this: the exploit was against their domain name, redirecting selected update requests away from the notepad++ servers. The software itself didn’t validate that the domain actually points to notepad++ servers, and the notepad++ update servers would not see any information that would tell them what was happening.

      Likely they picked some specific developers with a known public IP, and only used this to inject those specific people with malware.

        • MangoCats@feddit.it
          link
          fedilink
          English
          arrow-up
          1
          ·
          48 minutes ago

          That’s what they say they rolled out, after: “Within Notepad++ itself, WinGup (the updater) was enhanced in v8.8.9 to verify both the certificate and the signature of the downloaded installer”

            • Kissaki@feddit.org
              link
              fedilink
              English
              arrow-up
              2
              ·
              3 hours ago

              It’s not game over regardless if the updater checks a signature of the update installer. Them it wouldn’t run an installer by someone else.

                • Elvith Ma'for@feddit.org
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  2 hours ago

                  As the hoster wrote this:

                  we immediately transferred all clients’ web hosting subscriptions from this server

                  It looks like the binaries and the update check script were put on a simple web space. If that is the correct conclusion to draw from this excerpt, then it’d be rather strange to have the keys on that server as it’s very unlikely that it was used to produce any builds.