EmEditor Under Siege: Infostealer Malware Hits in Supply Chain Attack!
EmEditor users, watch out! A supply chain attack turned the ‘download now’ button into a ‘malware now’ button. If you clicked between December 19 and 22, consider your data compromised. Infostealer malware disguised as a legitimate installer is the culprit, targeting your system info, VPNs, and even your Facebook ad accounts. Stay vigilant!

Hot Take:
In a twist fit for a cyber-thriller, EmEditor went from a text editing hero to a malware villain faster than you can say “supply chain attack”. It seems the code ninjas over at Emurasoft need to sharpen their defenses or risk becoming the next blockbuster hit in the cybercrime cinema. Watch out, Hollywood, there’s a new script in town!
Key Points:
- EmEditor was hit by a supply chain attack, distributing infostealer malware.
- The attack involved a fake installer, signed by an unfamiliar certificate.
- Chinese security firm Qianxin revealed the malware’s extensive data-stealing antics.
- The malware checks for system languages and plays favorites with non-Soviet, non-Iranian settings.
- No clear attribution, but cybercriminals likely behind this digital heist.
Already a member? Log in here
