MD5 hashes of the compromised package files and individual components.
The URLs of the C2 server involved in the attack.
The security community is actively working to address this threat, and users of Notepad++ are strongly advised to verify their installations’ integrity and update their software from the official Notepad++ website.
Notepad++ users are strongly advised to verify their installations’ integrity and update their software from the official Notepad++ website.