{"id":6020,"date":"2025-12-18T10:31:10","date_gmt":"2025-12-18T10:31:10","guid":{"rendered":"https:\/\/www.cyberresilienceact.eu\/?p=6020"},"modified":"2026-03-26T04:48:22","modified_gmt":"2026-03-26T04:48:22","slug":"understanding-the-notepad-updater-hijack","status":"publish","type":"post","link":"https:\/\/www.cyberresilienceact.eu\/ja\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/","title":{"rendered":"Understanding the Notepad++ Updater Hijack"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"6020\" class=\"elementor elementor-6020\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d25007 e-flex e-con-boxed e-con e-parent\" data-id=\"8d25007\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6436c98 elementor-widget elementor-widget-heading\" data-id=\"6436c98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Understanding the Notepad++ Updater Hijack<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d57aac e-flex e-con-boxed e-con e-parent\" data-id=\"1d57aac\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a0fbd10 elementor-widget elementor-widget-text-editor\" data-id=\"a0fbd10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The Notepad++ Updater Hijack refers to a security vulnerability, specifically a <\/span><b>DLL Hijacking<\/b><span style=\"font-weight: 400;\"> attack, that was discovered and exploited in the update mechanism of the popular text editor, Notepad++. This vulnerability allowed an attacker to execute malicious code on a user&#8217;s system by manipulating the way the application&#8217;s updater searched for and loaded necessary files.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9848333 elementor-widget elementor-widget-text-editor\" data-id=\"9848333\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>I. Core Mechanism: DLL Search Order Hijacking<\/strong><\/h2><p>The vulnerability exploited the predictable search order that Windows applications, including the Notepad++ updater executable (gup.exe), use to locate Dynamic Link Libraries (DLLs).<\/p><h4>\u00a0<\/h4><h4><strong>1. How the Attack Worked<\/strong><\/h4><ul><li><b>Vulnerable Component:<\/b><span style=\"font-weight: 400;\"> The executable responsible for handling updates (<\/span><span style=\"font-weight: 400;\">gup.exe<\/span><span style=\"font-weight: 400;\">) was the entry point for the exploit.<\/span><\/li><li><b>Missing DLL:<\/b><span style=\"font-weight: 400;\"> When <\/span><span style=\"font-weight: 400;\">gup.exe<\/span><span style=\"font-weight: 400;\"> launched, it often looked for a specific, non-existent DLL file (often named like <\/span><span style=\"font-weight: 400;\">HncUpdate.dll<\/span><span style=\"font-weight: 400;\"> in early reports, or similar generic names depending on the specific version) to perform its functions.<\/span><\/li><li><b>Predictable Search Path:<\/b><span style=\"font-weight: 400;\"> Windows dictates a specific order for an application to search for a DLL:<\/span><ul><li><span style=\"font-weight: 400;\">The directory from which the application loaded.<\/span><\/li><li><span style=\"font-weight: 400;\">The system directory.<\/span><\/li><li><span style=\"font-weight: 400;\">The 16-bit system directory.<\/span><\/li><li><span style=\"font-weight: 400;\">The Windows directory.<\/span><\/li><li><span style=\"font-weight: 400;\">The current directory.<\/span><\/li><li><span style=\"font-weight: 400;\">The directories listed in the PATH environment variable.<\/span><\/li><\/ul><\/li><li><b>The Hijack:<\/b><span style=\"font-weight: 400;\"> An attacker could place a malicious DLL, crafted with the same name as the missing legitimate one, into a directory that was searched <\/span><i><span style=\"font-weight: 400;\">before<\/span><\/i><span style=\"font-weight: 400;\"> the legitimate system or application folder. Crucially, the &#8220;current working directory&#8221; (CWD) was often searched early in the process.<\/span><\/li><li><b style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, 'Noto Sans', sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol', 'Noto Color Emoji';\">Execution:<\/b><span style=\"font-weight: 400;\"> If a user launched the Notepad++ updater from a directory containing the malicious DLL (e.g., if the user downloaded a file or installer package to their Downloads folder, and the package included the malicious DLL), the updater would load and execute the malicious DLL instead of skipping the search or loading the correct one from a safer location. This granted the attacker code execution privileges at the level of the Notepad++ application (usually the user&#8217;s privileges).<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec5c465 elementor-widget elementor-widget-text-editor\" data-id=\"ec5c465\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><b>2. What is the Lesson for IoT Devices?<\/b><\/h4><p><span style=\"font-weight: 400;\">This vulnerability show the risk for automatic software update tools for IoT devices, while those tools are mandatory according to the Cyber Resilience Act, the are also one of the main risks with the device security.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">The most risky solution are open source based tools, as they are been used by many IoT devices the risk of attacks is higher. On the other hand, DYI tool which is done correctly and is not connected to highly valuable device is unlikely to be hacked. The Critical Security Lesson for IoT Devices: Balancing Necessity and Risk in Software Updates.<\/span><\/p><p><span style=\"font-weight: 400;\">The discovery of this vulnerability provides a stark and critical lesson for the Internet of Things (IoT) ecosystem, particularly concerning the increasingly complex landscape of software updates. While automatic software update tools are becoming a mandatory requirement, driven by legislation like the proposed Cyber Resilience Act (CRA) to ensure long-term device security, they simultaneously introduce one of the most significant attack vectors and security risks for connected devices.<\/span><\/p><p><b>The Double-Edged Sword of Automated Updates:<\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Necessity (The Cyber Resilience Act Context):<\/b><span style=\"font-weight: 400;\"> Automated updates are essential for patching newly discovered security flaws, deploying critical fixes, and maintaining compliance over a device&#8217;s lifecycle. Without them, millions of devices would remain permanently vulnerable. The CRA recognizes this necessity, pushing for mechanisms that ensure timely and secure patching.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Risk (The Attack Vector):<\/b><span style=\"font-weight: 400;\"> The very mechanism designed to deliver security\u2014the update tool itself\u2014becomes a high-value target. A compromise of the update server, the distribution network, or the update verification process on the device can allow an attacker to push malicious firmware to a vast installed base, achieving a rapid and catastrophic security breach. This vulnerability underscores that the integrity and security of the <\/span><i><span style=\"font-weight: 400;\">software supply chain<\/span><\/i><span style=\"font-weight: 400;\"> are paramount.<br \/><\/span><\/li><\/ul><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1762a53 elementor-widget elementor-widget-text-editor\" data-id=\"1762a53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1><strong>II. Analyzing the Risk Profile of Update Solutions<\/strong><\/h1><p><span style=\"font-weight: 400;\">The risk associated with an update mechanism varies significantly based on its implementation and scale:<\/span><\/p><h4>\u00a0<\/h4><h4><b>1. High-Risk: Open-Source Based Solutions (Used at Scale)<\/b><\/h4><ul><li><b>Shared Vulnerability:<\/b><span style=\"font-weight: 400;\"> Tools built on popular, open-source foundations, while offering transparency and community vetting, are also a single point of failure across a massive number of devices and manufacturers. A flaw discovered in a widely used open-source update client or server component instantly exposes a vast portion of the IoT ecosystem.<\/span><\/li><li><b>Attractiveness to Attackers:<\/b><span style=\"font-weight: 400;\"> Their ubiquitous use makes them an extremely attractive and efficient target for sophisticated threat actors, as a successful exploit provides maximum return on effort.<\/span><\/li><\/ul><h4>\u00a0<\/h4><h4><b>2. Lower-Risk: DIY\/Bespoke Solutions (Used Minimally and Correctly)<\/b><\/h4><ul><li><b>Security by Obscurity (Limited Scope):<\/b><span style=\"font-weight: 400;\"> A well-implemented, proprietary, or custom &#8220;Do-It-Yourself&#8221; update tool, especially one used only for a limited number of specialized devices, is statistically less likely to be targeted. The attack cost for a bespoke system is much higher for an attacker who would need to reverse-engineer a unique solution.<\/span><\/li><li><b>Contextual Risk:<\/b><span style=\"font-weight: 400;\"> The lower risk is contingent on two crucial factors: <\/span><b>correct implementation<\/b><span style=\"font-weight: 400;\"> (robust cryptographic signing, secure communication protocols) and <\/span><b>low-value context<\/b><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"> (i.e., not connected to critical infrastructure, sensitive personal data, or high-value assets). If a custom tool is poorly secured or connected to highly valuable systems (e.g., industrial control, medical devices), the &#8220;DIY&#8221; approach offers no intrinsic security benefit and may even introduce unique, unknown flaws.<\/span><\/span><p>\u00a0<\/p><\/li><\/ul><p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6ccf27 elementor-widget elementor-widget-text-editor\" data-id=\"c6ccf27\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>III. Conclusion for Manufacturers and Regulators<\/strong><\/h2><p><span style=\"font-weight: 400;\">The central takeaway is that mandating automated updates is only half the solution. The other, more challenging half is ensuring that the update mechanism itself is fortified to the highest standards. Manufacturers must move beyond simple deployment and focus on:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Supply Chain Integrity:<\/b><span style=\"font-weight: 400;\"> Rigorous security protocols for the creation, signing, distribution, and consumption of update packages.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Robust Verification:<\/b><span style=\"font-weight: 400;\"> Employing strong, hardware-rooted cryptographic methods on the device to verify the authenticity and integrity of any incoming firmware before installation.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Principle of Least Privilege:<\/b><span style=\"font-weight: 400;\"> Designing update systems that minimize the potential damage if a component is compromised.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">This vulnerability serves as a critical warning: the mechanism intended to fix security problems must not become the easiest route for an attacker to create them.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8692c99 elementor-widget elementor-widget-spacer\" data-id=\"8692c99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Understanding the Notepad++ Updater Hijack The Notepad++ Updater Hijack refers to a security vulnerability, specifically a DLL Hijacking attack, that was discovered and exploited in the update mechanism of the popular text editor, Notepad++. This vulnerability allowed an attacker to execute malicious code on a user&#8217;s system by manipulating the way the application&#8217;s updater searched for and loaded necessary files. I. Core Mechanism: DLL Search Order Hijacking The vulnerability exploited the predictable search order that Windows applications, including the Notepad++ updater executable (gup.exe), use to locate Dynamic Link Libraries (DLLs). \u00a0 1. How the Attack Worked Vulnerable Component: The executable responsible for handling updates (gup.exe) was the entry point for [&hellip;]<\/p>","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"class_list":["post-6020","post","type-post","status-publish","format-standard","hentry","category-cra-insights"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DISK46: Raspberry Pi Risk Assessment - Cyber Resilience Act<\/title>\n<meta name=\"description\" content=\"DISK46 represents a specialized Linux distribution image, meticulously crafted with a preinstalled LUKS encryption layer. This design...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberresilienceact.eu\/ja\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DISK46: Raspberry Pi Risk Assessment - Cyber Resilience Act\" \/>\n<meta property=\"og:description\" content=\"DISK46 represents a specialized Linux distribution image, meticulously crafted with a preinstalled LUKS encryption layer. This design...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberresilienceact.eu\/ja\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Act\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-18T10:31:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T04:48:22+00:00\" \/>\n<meta name=\"author\" content=\"seongeun\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"seongeun\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/\"},\"author\":{\"name\":\"seongeun\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#\/schema\/person\/4f6debb97f21ed20b0cae20f2231e61f\"},\"headline\":\"Understanding the Notepad++ Updater Hijack\",\"datePublished\":\"2025-12-18T10:31:10+00:00\",\"dateModified\":\"2026-03-26T04:48:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/\"},\"wordCount\":986,\"publisher\":{\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#organization\"},\"articleSection\":[\"CRA Insights\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/\",\"url\":\"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/\",\"name\":\"DISK46: Raspberry Pi Risk Assessment - Cyber Resilience Act\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#website\"},\"datePublished\":\"2025-12-18T10:31:10+00:00\",\"dateModified\":\"2026-03-26T04:48:22+00:00\",\"description\":\"DISK46 represents a specialized Linux distribution image, meticulously crafted with a preinstalled LUKS encryption layer. This design...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberresilienceact.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding the Notepad++ Updater Hijack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#website\",\"url\":\"https:\/\/www.cyberresilienceact.eu\/\",\"name\":\"Cyber Resilience Act\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberresilienceact.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#organization\",\"name\":\"Cyber Resilience Act\",\"url\":\"https:\/\/www.cyberresilienceact.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/Cyber-Resilience-Act-logo.png\",\"contentUrl\":\"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/Cyber-Resilience-Act-logo.png\",\"width\":776,\"height\":87,\"caption\":\"Cyber Resilience Act\"},\"image\":{\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#\/schema\/person\/4f6debb97f21ed20b0cae20f2231e61f\",\"name\":\"seongeun\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/www.cyberresilienceact.eu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6327812e32618c153a2a6d1925b9f02c838a48397289a1fcf29bf7bf10a400a8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6327812e32618c153a2a6d1925b9f02c838a48397289a1fcf29bf7bf10a400a8?s=96&d=mm&r=g\",\"caption\":\"seongeun\"},\"url\":\"https:\/\/www.cyberresilienceact.eu\/ja\/author\/seongeun\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DISK46: Raspberry Pi Risk Assessment - Cyber Resilience Act","description":"DISK46 represents a specialized Linux distribution image, meticulously crafted with a preinstalled LUKS encryption layer. This design...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberresilienceact.eu\/ja\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/","og_locale":"ja_JP","og_type":"article","og_title":"DISK46: Raspberry Pi Risk Assessment - Cyber Resilience Act","og_description":"DISK46 represents a specialized Linux distribution image, meticulously crafted with a preinstalled LUKS encryption layer. This design...","og_url":"https:\/\/www.cyberresilienceact.eu\/ja\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/","og_site_name":"Cyber Resilience Act","article_published_time":"2025-12-18T10:31:10+00:00","article_modified_time":"2026-03-26T04:48:22+00:00","author":"seongeun","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"seongeun","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"5\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/#article","isPartOf":{"@id":"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/"},"author":{"name":"seongeun","@id":"https:\/\/www.cyberresilienceact.eu\/#\/schema\/person\/4f6debb97f21ed20b0cae20f2231e61f"},"headline":"Understanding the Notepad++ Updater Hijack","datePublished":"2025-12-18T10:31:10+00:00","dateModified":"2026-03-26T04:48:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/"},"wordCount":986,"publisher":{"@id":"https:\/\/www.cyberresilienceact.eu\/#organization"},"articleSection":["CRA Insights"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/","url":"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/","name":"DISK46: Raspberry Pi Risk Assessment - Cyber Resilience Act","isPartOf":{"@id":"https:\/\/www.cyberresilienceact.eu\/#website"},"datePublished":"2025-12-18T10:31:10+00:00","dateModified":"2026-03-26T04:48:22+00:00","description":"DISK46 represents a specialized Linux distribution image, meticulously crafted with a preinstalled LUKS encryption layer. This design...","breadcrumb":{"@id":"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberresilienceact.eu\/2025\/12\/18\/understanding-the-notepad-updater-hijack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberresilienceact.eu\/"},{"@type":"ListItem","position":2,"name":"Understanding the Notepad++ Updater Hijack"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberresilienceact.eu\/#website","url":"https:\/\/www.cyberresilienceact.eu\/","name":"Cyber Resilience Act","description":"","publisher":{"@id":"https:\/\/www.cyberresilienceact.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberresilienceact.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/www.cyberresilienceact.eu\/#organization","name":"Cyber Resilience Act","url":"https:\/\/www.cyberresilienceact.eu\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.cyberresilienceact.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/Cyber-Resilience-Act-logo.png","contentUrl":"https:\/\/www.cyberresilienceact.eu\/wp-content\/uploads\/2023\/05\/Cyber-Resilience-Act-logo.png","width":776,"height":87,"caption":"Cyber Resilience Act"},"image":{"@id":"https:\/\/www.cyberresilienceact.eu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cyberresilienceact.eu\/#\/schema\/person\/4f6debb97f21ed20b0cae20f2231e61f","name":"seongeun","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/www.cyberresilienceact.eu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6327812e32618c153a2a6d1925b9f02c838a48397289a1fcf29bf7bf10a400a8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6327812e32618c153a2a6d1925b9f02c838a48397289a1fcf29bf7bf10a400a8?s=96&d=mm&r=g","caption":"seongeun"},"url":"https:\/\/www.cyberresilienceact.eu\/ja\/author\/seongeun\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/posts\/6020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/comments?post=6020"}],"version-history":[{"count":7,"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/posts\/6020\/revisions"}],"predecessor-version":[{"id":6027,"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/posts\/6020\/revisions\/6027"}],"wp:attachment":[{"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/media?parent=6020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/categories?post=6020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberresilienceact.eu\/ja\/wp-json\/wp\/v2\/tags?post=6020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}