Interestingly, @GossiTheDog was pretty on top of this in December weeks before Notepad++ formally disclosed. I agree with the assessment that, while Notepad++’s update situation was a little shaky, fundamentally it wasn’t gross negligence on their part but attracting powerful attention. (The developer is very openly pro-Taiwan and pro-Ukraine, and the state actors may have reasoned it was a good way to gain access to orgs with aligned views)
edit to extract the blog link from the post as I’ve realized this user has an autodelete timer: https://doublepulsar.com/small-numbers-of-notepad-users-reporting-security-woes-371d7a3fd2d9

@mer @0xabad1dea Not to mention, the extension marketplace is a breeding ground for malicious actors (however aligned). And the execution of scripts after trusting the repo in VSCode the OP pointed out a while ago.
Maybe VSCode isn't the right IDE either 
@0xabad1dea As a Notepad++ user, yikes.
I wonder why a state actor would specifically target Notepad++. It seems like an odd choice.
@0xabad1dea Interesting.
The incident began from June 2025. Multiple independaent [sic] security researchers have assessed that the threat acotor is likely a Chinese state-sponsored group, which would explain the highly selective targeting obseved during the campaign.