Following our earlier announcement, “[Important] Security Incident Notice Regarding the EmEditor Installer Download Link”, we are sharing what we have learned through further investigation, along with additional details that supplement the previous notice.
We sincerely apologize once again for the serious concern and inconvenience this incident has caused.
1. Time Period Potentially Affected (U.S. Pacific Time / UTC)
In our previous notice, we provided the timeframe in U.S. Pacific Time. For reference, we also include Coordinated Universal Time (UTC).
- Dec 19, 2025 18:39 – Dec 22, 2025 12:50 (U.S. Pacific Time)
- 2025-12-20 02:39 – 2025-12-22 20:50 (UTC)
If you downloaded the installer during the period above via the EmEditor website download path (for example, the “Download Now” button), there is a possibility that you downloaded a file that was not the legitimate installer provided by us (Emurasoft, Inc.).
Please note that the period above is intentionally broad out of an abundance of caution. The actual window may have been shorter and limited to specific times.
2. About the Suspicious File (Confirmed Differences)
For the file emed64_25.4.3.msi, we have confirmed the existence of at least two suspicious files.
We also confirmed that both suspicious files were signed with Microsoft-issued digital signatures. Because the validity periods were extremely short (only a few days), we believe the certificates were likely issued in a manner similar to developer-oriented issuance.
We reported this incident to Microsoft, provided the suspicious files, and requested revocation of the relevant signatures. We have now confirmed that both signatures have been revoked. As a result, attempting to run the MSI should display a warning that the signature is invalid, making installation difficult.
Legitimate file (official EmEditor installer)
Problematic file #1
Problematic file #2
3. If You Already Deleted the Downloaded File
If you still have the downloaded file (emed64_25.4.3.msi), you can verify it (as previously announced) by checking the digital signature and/or SHA-256.
Even if you already deleted the file, Windows may have kept a copy of the MSI used during installation under C:\Windows\Installer, stored under a different name.
Because this folder is both hidden and protected by the OS, it can be difficult to locate through normal File Explorer browsing. Please open it directly by entering: C:\Windows\Installer.
After opening the folder, we recommend the steps below. Please be extremely careful not to double-click or run any MSI files.
- Sort by date (for example, “Date modified”)
- Focus on recent files
- Check the target file’s digital signature (Right-click → Properties → Digital Signatures)
4. How To Check whether Your Computer May be Infected
Even if the suspicious file was executed, infection is not guaranteed in environments such as:
- The device was offline
- A VPN/proxy was required
- Suspicious PowerShell behavior was blocked by Windows features or policies
- PowerShell execution was restricted
- Antivirus/security software blocked the activity
However, if any of the following apply, the likelihood of infection becomes very high:
C:\ProgramData\tmp_mojo.log exists
- A scheduled task named
Google Drive Caching exists
background.vbs exists in %LOCALAPPDATA%\Google Drive Caching\
- A browser extension named
Google Drive Caching exists in a Chromium-based browser such as Chrome or Microsoft Edge (even if it claims to be made by Google)—especially if it can “read and change data on all websites” and has clipboard access
- Network logs show connections to any of the following:
cachingdrive[.]com
emeditorde[.]com
emeditorgb[.]com
emeditorjp[.]com
emeditorsb[.]com
If none of the above apply, the risk is lower—but not zero—because part of the attack can run in memory and leave little or no file-based evidence.
5. Confirmed Behavior (Destination Domains, etc.)
As previously announced, we confirmed that the suspicious installer, when executed, downloads additional files from external domains and executes them.
While we previously confirmed access to emeditorjp[.]com, subsequent investigation has found additional access to emeditorde[.]com, emeditorgb[.]com, and emeditorsb[.]com as well.
None of these four domains (emeditorjp[.]com, emeditorde[.]com, emeditorgb[.]com, emeditorsb[.]com) are operated by us (Emurasoft, Inc.).
We also confirmed that the PowerShell command described in the previous notice downloads and executes files from external domains, and that this behavior could lead to malware infection and theft of personal information such as passwords.
For additional details, please refer to the research report prepared by Mr. Luca Palermo and Mr. Mario Ciccarelli. Mr. Palermo provided the report to us and granted permission for us to publish it, and we would like to express our sincere thanks for their cooperation.
6. Why This Was “Hard to Spot”
As a basic reality, both domains and digital signatures can be obtained by third parties under certain conditions.
- Domains can often be purchased at low cost if they are unused or not renewed.
- Code-signing certificates can generally be obtained from many certificate authorities (in this case, the issuer was Microsoft).
- Once an issue is discovered, the main available response is to contact the issuer/certification authority and request revocation.
From a technical perspective, MSI installers can include arbitrary scripts (including PowerShell) via custom actions. With sufficient knowledge, an attacker can inject a malware loader into an installer that closely resembles a legitimate, widely distributed one.
Even if the installer were an EXE rather than an MSI, similar attacks would still be possible.
Unfortunately, this means it is difficult for software companies to completely prevent malicious installers that closely imitate legitimate ones from being created and distributed. We must assume that similarly sophisticated, multi-stage malware installers could appear again in the future.
That said, we believe the core issues in this incident can be summarized as follows:
- A convenient redirect (download path) used on our website was altered without being detected.
- A malicious installer was placed on our website by an external party.
Because these occurred together, we take full responsibility for the fact that customers were harmed after downloading from our official website, and we will reflect this in our future preventive measures.
6-1. Malicious files placed on the EmEditor website
In addition to the malicious installer emed64_25.4.3.msi, we discovered a file named base64.php under a plugin directory. After analyzing base64.php, we determined it was a typical backdoor (remote code execution / RCE).
We also found that a script had been added to footer.php (within the WordPress theme directory). This script hijacked clicks intended for the legitimate URL:
https://support.emeditor.com/ja/downloads/latest/installer/64
and redirected them to:
/wp-content/uploads/filebase/emeditor-core/emed64_25.4.3.msi
As a result, clicking the “Download Now” button on the homepage could lead to the malicious file being downloaded.
More maliciously, the script was configured to trigger only for visitors who were not logged in, making the issue difficult for administrators to reproduce and detect. As a result, even when we checked the site ourselves, we did not immediately notice that the redirect had been altered.
7. Cause (Current Assessment)
We are still investigating and have not reached a final conclusion. However, we are considering the possibilities below.
WordPress is made up of multiple components—core, plugins, themes, and more—maintained by many developers. Vulnerabilities are regularly discovered in these components, and updates are released over time.
We regularly update plugins and themes, but in some cases vulnerabilities may remain unpatched for extended periods. It is possible that the attack exploited such a vulnerability.
It is also possible that the SFTP account in use was targeted.
8. Our Response (Completed / Planned)
We immediately deleted the malicious file emed64_25.4.3.msi. We also reviewed file modification logs and confirmed the addition of base64[.]php and changes to footer[.]php. After identifying base64[.]php as a backdoor, we scanned the entire site.
We then rebuilt the website, reinstalled all plugins, and removed unnecessary plugins. We also scanned internal computers and changed login passwords for all WordPress sites and related services. We audited several services we used by looking through their logs.
In addition, we stopped using redirects for download buttons such as “Download Now,” and replaced them with direct links to verified safe files. We also updated the download page to clearly show the MSI’s SHA-256 and added instructions encouraging users to verify the digital signature.
To further strengthen the EmEditor homepage download path, we are also considering migrating the site to a custom/static website instead of WordPress in the near future.
9. Closing
As described above, an installer that has been tampered with can perform extremely dangerous actions when executed. At the same time, we cannot fundamentally prevent third parties from creating and distributing malicious installers that imitate legitimate ones.
Therefore, our top priority is to make sure no one can obtain malware through our website, since it’s our primary distribution channel.
This incident also reminded us that while popular CMS platforms such as Xoops and WordPress are convenient, their extensibility can increase exposure to vulnerabilities—and that simply keeping plugins and themes updated does not eliminate risk entirely.
Fortunately, the Emurasoft Customer Center was not compromised, and our database remained secure. We have no evidence that anyone accessed our customer database.
In the hope that what we learned from this incident will help other software companies, we have included as much detail and context as possible rather than limiting this to a brief report.
We once again offer our sincere apologies for the concern and inconvenience caused. We especially apologize to those who suffered harm related to infection.
Thank you for your continued support of EmEditor.
EmEditor v26.0 preview released
/in EmEditor Preview/by Yutaka EmuraThis message contains changelog regarding v26.0 preview. The information is being updated as more preview versions are released.
Please see New in Version 26.0 for screenshots.
Please contact us for any questions or comments. Thank you for trying EmEditor preview!
To update
If you use the installer version, please select Customize Update Checker on the Help menu, and set the Include preview versions in order to update automatically to future preview versions. Preview versions can also be downloaded at Previous versions.
preview 1 (25.9.901) – January 26, 2026
New General Features
Codecommand now works even when no text is selected. [P]New Options
gpt-5.2andgpt-5.2.codexto the Preferred Model drop-down list in the AI Options page of the Customize dialog box (this feature requires the Chat with AI plugin). [P]Plug-in New Features [P]
Bug fixes
Notes
[PF] EmEditor Professional and EmEditor Free
[P] EmEditor Professional only
EmEditor Is Now Even More Secure to Download
/in General/by Yutaka EmuraEmEditor Is Now Even Safer and Easier to Get
The EmEditor desktop installer is now also available from the Microsoft Store.
The desktop installer available on the Microsoft Store is the same program for both EmEditor Professional and EmEditor Free (you get the same app and use it according to your license/usage).
We have also improved our official website (www.emeditor.com) so you can download EmEditor with greater peace of mind.
We will continue to provide only official installers through our website and other authorized distribution channels.
For your safety, please download EmEditor from trusted sources such as our official website or the Microsoft Store.
Download from Microsoft Store
Other downloads
EmEditor v25.4.5 Released – Now available from Microsoft Store!
/in EmEditor Core/by Yutaka EmuraEmEditor v25.4.5 is now available. This update focuses on stability and includes the fixes listed below. We recommend updating to the latest version for the best experience.
If you’re using the Desktop Installer version, go to Help → Check for Updates to download the latest version. If that doesn’t work—or if you don’t currently have EmEditor installed—please download the installer and run it.
EmEditor (desktop installer) is now also available from the Microsoft Store:
Download Desktop Installer from Microsoft Store (Recommended)
For earlier versions of Windows, you can download the installer directly here.
If you download the MSI file directly, please verify that the digital signature is signed by “Emurasoft, Inc.”:
EmEditor’s Update Checker automatically verifies the MSI signer and cancels the update if the signer is not Emurasoft, Inc..
Alternatively, you can verify the SHA-256 hash values:
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 you use the Desktop portable version, please visit the Download page to get the latest version. The Store App version can be updated through the Microsoft Store after a few days.
New static, HTML-based websites
/in General/by Yutaka EmuraTo reduce the security risks associated with WordPress, we’ve migrated our websites to static, HTML-based sites. As a result, the likelihood of future security incidents is expected to be extremely low.
As part of this transition, our forums are now available in read-only mode.
Thank you for your understanding.
EmEditor v25.4.4 Released
/in EmEditor Core/by Yutaka EmuraEmEditor v25.4.4 is now available. This release focuses on stability and includes the fixes listed below. We recommend updating to the latest version for the best experience.
If you’re using the Desktop Installer version, go to Help → Check for Updates to download the latest version. If that doesn’t work, please download the installer (emed64_25.4.4.msi) and run it.
If you download the MSI file directly, please verify that the digital signature is signed by “Emurasoft, Inc.”:
EmEditor’s Update Checker automatically verifies the MSI signer and cancels the update if the signer is not Emurasoft, Inc.
Alternatively, you can verify the SHA-256 hash values using the following:
09e884896467b8fa574b2adf22d792e039774b8fb1300ec26a59c951937eaa3cf4db8fe290d3d5d44bd08461da24f168a73b085c6d589687f41b0a9a820556e8If you use the Desktop portable version, please visit the Download page to get the latest version. The Store App version can be updated through the Microsoft Store after a few days.
[Important] Follow-up: Security Incident Notice Regarding the EmEditor Installer Download Link
/in General/by Yutaka EmuraFollowing our earlier announcement, “[Important] Security Incident Notice Regarding the EmEditor Installer Download Link”, we are sharing what we have learned through further investigation, along with additional details that supplement the previous notice.
We sincerely apologize once again for the serious concern and inconvenience this incident has caused.
1. Time Period Potentially Affected (U.S. Pacific Time / UTC)
In our previous notice, we provided the timeframe in U.S. Pacific Time. For reference, we also include Coordinated Universal Time (UTC).
If you downloaded the installer during the period above via the EmEditor website download path (for example, the “Download Now” button), there is a possibility that you downloaded a file that was not the legitimate installer provided by us (Emurasoft, Inc.).
Please note that the period above is intentionally broad out of an abundance of caution. The actual window may have been shorter and limited to specific times.
2. About the Suspicious File (Confirmed Differences)
For the file
emed64_25.4.3.msi, we have confirmed the existence of at least two suspicious files.We also confirmed that both suspicious files were signed with Microsoft-issued digital signatures. Because the validity periods were extremely short (only a few days), we believe the certificates were likely issued in a manner similar to developer-oriented issuance.
We reported this incident to Microsoft, provided the suspicious files, and requested revocation of the relevant signatures. We have now confirmed that both signatures have been revoked. As a result, attempting to run the MSI should display a warning that the signature is invalid, making installation difficult.
Legitimate file (official EmEditor installer)
e5f9c1e9b586b59712cefa834b67f829ccbed183c6855040e6d42f0c0c3fcb3ehttps://www.virustotal.com/gui/file/e5f9c1e9b586b59712cefa834b67f829ccbed183c6855040e6d42f0c0c3fcb3e
Problematic file #1
emed64_25.4.3.msi4bea333d3d2f2a32018cd6afe742c3b25bfcc6bfe8963179dad3940305b13c98https://www.virustotal.com/gui/file/4bea333d3d2f2a32018cd6afe742c3b25bfcc6bfe8963179dad3940305b13c98
Problematic file #2
emed64_25.4.3.msi3d1763b037e66bbde222125a21b23fc24abd76ebab40589748ac69e2f37c27fchttps://www.virustotal.com/gui/file/3d1763b037e66bbde222125a21b23fc24abd76ebab40589748ac69e2f37c27fc
3. If You Already Deleted the Downloaded File
If you still have the downloaded file (
emed64_25.4.3.msi), you can verify it (as previously announced) by checking the digital signature and/or SHA-256.Even if you already deleted the file, Windows may have kept a copy of the MSI used during installation under
C:\Windows\Installer, stored under a different name.Because this folder is both hidden and protected by the OS, it can be difficult to locate through normal File Explorer browsing. Please open it directly by entering:
C:\Windows\Installer.After opening the folder, we recommend the steps below. Please be extremely careful not to double-click or run any MSI files.
4. How To Check whether Your Computer May be Infected
Even if the suspicious file was executed, infection is not guaranteed in environments such as:
However, if any of the following apply, the likelihood of infection becomes very high:
C:\ProgramData\tmp_mojo.logexistsGoogle Drive Cachingexistsbackground.vbsexists in%LOCALAPPDATA%\Google Drive Caching\Google Drive Cachingexists in a Chromium-based browser such as Chrome or Microsoft Edge (even if it claims to be made by Google)—especially if it can “read and change data on all websites” and has clipboard accesscachingdrive[.]comemeditorde[.]comemeditorgb[.]comemeditorjp[.]comemeditorsb[.]comIf none of the above apply, the risk is lower—but not zero—because part of the attack can run in memory and leave little or no file-based evidence.
5. Confirmed Behavior (Destination Domains, etc.)
As previously announced, we confirmed that the suspicious installer, when executed, downloads additional files from external domains and executes them.
While we previously confirmed access to
emeditorjp[.]com, subsequent investigation has found additional access toemeditorde[.]com,emeditorgb[.]com, andemeditorsb[.]comas well.None of these four domains (
emeditorjp[.]com,emeditorde[.]com,emeditorgb[.]com,emeditorsb[.]com) are operated by us (Emurasoft, Inc.).We also confirmed that the PowerShell command described in the previous notice downloads and executes files from external domains, and that this behavior could lead to malware infection and theft of personal information such as passwords.
For additional details, please refer to the research report prepared by Mr. Luca Palermo and Mr. Mario Ciccarelli. Mr. Palermo provided the report to us and granted permission for us to publish it, and we would like to express our sincere thanks for their cooperation.
6. Why This Was “Hard to Spot”
As a basic reality, both domains and digital signatures can be obtained by third parties under certain conditions.
From a technical perspective, MSI installers can include arbitrary scripts (including PowerShell) via custom actions. With sufficient knowledge, an attacker can inject a malware loader into an installer that closely resembles a legitimate, widely distributed one.
Even if the installer were an EXE rather than an MSI, similar attacks would still be possible.
Unfortunately, this means it is difficult for software companies to completely prevent malicious installers that closely imitate legitimate ones from being created and distributed. We must assume that similarly sophisticated, multi-stage malware installers could appear again in the future.
That said, we believe the core issues in this incident can be summarized as follows:
Because these occurred together, we take full responsibility for the fact that customers were harmed after downloading from our official website, and we will reflect this in our future preventive measures.
6-1. Malicious files placed on the EmEditor website
In addition to the malicious installer
emed64_25.4.3.msi, we discovered a file namedbase64.phpunder a plugin directory. After analyzingbase64.php, we determined it was a typical backdoor (remote code execution / RCE).We also found that a script had been added to
footer.php(within the WordPress theme directory). This script hijacked clicks intended for the legitimate URL:https://support.emeditor.com/ja/downloads/latest/installer/64and redirected them to:
/wp-content/uploads/filebase/emeditor-core/emed64_25.4.3.msiAs a result, clicking the “Download Now” button on the homepage could lead to the malicious file being downloaded.
More maliciously, the script was configured to trigger only for visitors who were not logged in, making the issue difficult for administrators to reproduce and detect. As a result, even when we checked the site ourselves, we did not immediately notice that the redirect had been altered.
7. Cause (Current Assessment)
We are still investigating and have not reached a final conclusion. However, we are considering the possibilities below.
WordPress is made up of multiple components—core, plugins, themes, and more—maintained by many developers. Vulnerabilities are regularly discovered in these components, and updates are released over time.
We regularly update plugins and themes, but in some cases vulnerabilities may remain unpatched for extended periods. It is possible that the attack exploited such a vulnerability.
It is also possible that the SFTP account in use was targeted.
8. Our Response (Completed / Planned)
We immediately deleted the malicious file
emed64_25.4.3.msi. We also reviewed file modification logs and confirmed the addition ofbase64[.]phpand changes tofooter[.]php. After identifyingbase64[.]phpas a backdoor, we scanned the entire site.We then rebuilt the website, reinstalled all plugins, and removed unnecessary plugins. We also scanned internal computers and changed login passwords for all WordPress sites and related services. We audited several services we used by looking through their logs.
In addition, we stopped using redirects for download buttons such as “Download Now,” and replaced them with direct links to verified safe files. We also updated the download page to clearly show the MSI’s SHA-256 and added instructions encouraging users to verify the digital signature.
To further strengthen the EmEditor homepage download path, we are also considering migrating the site to a custom/static website instead of WordPress in the near future.
9. Closing
As described above, an installer that has been tampered with can perform extremely dangerous actions when executed. At the same time, we cannot fundamentally prevent third parties from creating and distributing malicious installers that imitate legitimate ones.
Therefore, our top priority is to make sure no one can obtain malware through our website, since it’s our primary distribution channel.
This incident also reminded us that while popular CMS platforms such as Xoops and WordPress are convenient, their extensibility can increase exposure to vulnerabilities—and that simply keeping plugins and themes updated does not eliminate risk entirely.
Fortunately, the Emurasoft Customer Center was not compromised, and our database remained secure. We have no evidence that anyone accessed our customer database.
In the hope that what we learned from this incident will help other software companies, we have included as much detail and context as possible rather than limiting this to a brief report.
We once again offer our sincere apologies for the concern and inconvenience caused. We especially apologize to those who suffered harm related to infection.
Thank you for your continued support of EmEditor.
[Important] Security Incident Notice Regarding the EmEditor Installer Download Link
/in General/by Yutaka EmuraWe regret to inform you that we have identified an incident involving the EmEditor official website’s download path (the [Download Now] button), where unauthorized modification by a third party is suspected. During the affected period, the installer downloaded via that button may not have been the legitimate file provided by us (Emurasoft, Inc.).
We sincerely apologize for the concern and inconvenience this may cause. Please review the information below.
1. Potentially Affected Period
If you downloaded the installer from the [Download Now] button on the EmEditor homepage during this period, it is possible that a different file without our digital signature was downloaded. This is a conservative estimate, and in reality the affected period may have been narrower and limited to a specific timeframe.
2. Incident Summary (High-Level Cause)
The [Download Now] button normally points to the following URL:
This URL uses a redirect. However, during the affected period, the redirect settings appear to have been altered by a third party, resulting in downloads being served from the following (incorrect) URL:
This file was not created by Emurasoft, Inc., and it has already been removed.
As a result, we have confirmed that the downloaded file may be digitally signed not by us, but by another organization named WALSHAM INVESTMENTS LIMITED.
Note: This issue may not be limited to the English page and may affect similar URLs for other languages as well (including Japanese).
3. File Confirmed as Potentially Affected
At this time, the only file confirmed to be involved is:
Legitimate file (official)
e5f9c1e9b586b59712cefa834b67f829ccbed183c6855040e6d42f0c0c3fcb3eSuspicious file (possible tampering)
4. Not Affected
You are not affected if any of the following applies:
download.emeditor.infoExample: https://download.emeditor.info/emed64_25.4.3.msi
emed64_25.4.3.msi5. How to Check and What to Do
If you may have downloaded the installer via [Download Now] during the affected period, please verify the digital signature and SHA-256 hash of the file
emed64_25.4.3.msi.5-1. How to check the Digital Signature (Windows)
emed64_25.4.3.msi) and select Properties.If the “Digital Signatures” tab is not shown, the file may be unsigned or the signature may not be recognized. In that case, do not run the file; delete it and follow the guidance below.
5-2. How to check SHA-256 (Windows / PowerShell)
Open PowerShell and run:
Confirm the output SHA-256 matches:
e5f9c1e9b586b59712cefa834b67f829ccbed183c6855040e6d42f0c0c3fcb3eIf the signature or SHA-256 does not match (Recommended actions)
If the digital signature is not Emurasoft, Inc. (e.g., it is WALSHAM INVESTMENTS LIMITED) or the SHA-256 does not match, you may have obtained a tampered file (potentially containing malware).
If you are using EmEditor in an organization, we also recommend contacting your internal security team (e.g., CSIRT) and preserving relevant logs where possible.
6. Observed Behavior (As Currently Confirmed)
The suspicious installer may attempt to run a powershell script, which downloads and executes content from
emeditorjp[.]com.emeditorjp[.]com is not a domain managed by Emurasoft, Inc.
Please also note that the installer may still proceed to install EmEditor normally and install legitimate EmEditor program files, which could make the issue difficult to notice.
7. Current Status and Next Updates
We are continuing to investigate the facts and determine the full scope of impact. We will provide updates on this page and/or through our official channels as soon as more information becomes available.
We take this incident very seriously and will implement necessary measures to identify the cause and prevent recurrence.
We sincerely apologize again for the inconvenience and concern this may have caused, and we appreciate your understanding and continued support of EmEditor.
EmEditor v25.4.3 Released
/in EmEditor Core/by Yutaka EmuraWe released EmEditor v25.4.3 today. This update focuses on stability and includes the following fixes—please keep your software current for the best experience:
If you use the Desktop Installer version, you can select Check for Updates from the Help menu to download the latest version. If this method fails, please download the latest version, and run the downloaded installer. If you use the Desktop portable version, you can go to the Download page to get the latest version. The Store App version can be updated through the (Microsoft Store after a few days.
EmEditor v25.4.2 Released
/in EmEditor Core/by Yutaka EmuraWe’ve just released EmEditor v25.4.2. This update delivers several important fixes and optimizations to keep your experience smooth and stable, so we recommend updating as soon as possible.
If you use the Desktop Installer version, you can select Check for Updates from the Help menu to download the latest version. If this method fails, please download the latest version, and run the downloaded installer. If you use the Desktop portable version, you can go to the Download page to get the latest version. The Store App version can be updated through the (Microsoft Store after a few days.
EmEditor v25.4.1 Released
/in EmEditor Core/by Yutaka EmuraToday, we are releasing EmEditor v25.4.1.
v25.4.1 includes the following bug fixes. Please make sure to always update to the latest version for stable operations.
If you use the Desktop Installer version, you can select Check for Updates from the Help menu to download the latest version. If this method fails, please download the latest version, and run the downloaded installer. If you use the Desktop portable version, you can go to the Download page to get the latest version. The Store App version can be updated through the (Microsoft Store after a few days.