Fraudulent Job Advertisements Misusing Emurasoft’s Name on Social Media

We would like to alert the public to a fraudulent job advertisement on social media, including Facebook, that is falsely using the name of Emurasoft, Inc. We have already received inquiries from multiple job seekers who have been affected.

Please be advised: Emurasoft is not currently hiring, and we do not recruit through agents, third parties, or social networks such as Facebook.

How the scam works

If you respond to one of these fraudulent ads, the scammers may try to do the following:

  1. Conduct a fake online interview
  2. Ask for your personal information
  3. Falsely claim that you have received a job offer for a position such as Data Entry Associate at Emurasoft, Inc.
    This offer is completely fake.
  4. Tell you that they will purchase equipment for you, such as a computer, Blu-ray drive, and other necessary items
  5. Send you a fraudulent eCheck and instruct you to use it to purchase software or equipment
  6. Cause immediate financial harm if you accept or deposit the fake eCheck, including:
  • financial loss
  • bank penalties or fees
  • damage to your banking history

Important facts

  • Emurasoft is not currently hiring
  • We do not hire through agents
  • We do not recruit through Facebook or other social networks
  • We do not send checks to job applicants to purchase equipment or software

What to do if you see one of these ads

If you come across such an ad on social media, please report it to the platform immediately.

On Facebook, you can report an ad by clicking the three-dot menu (…) on the ad and selecting “Report ad,” then following the on-screen instructions.

For ads that are not in your feed, you can use the Meta Ad Library to locate and report them.

If you are unsure, contact us

If you have any doubt about whether a message, ad, or job opportunity is genuinely from Emurasoft, please contact us directly before responding or sharing any personal or financial information.

Thank you for helping us prevent abuse of our company name and protect job seekers from fraud.

Fraudulent Job Advertisements Misusing Emurasoft’s Name on Facebook

Domain Changes as Part of Security Improvements

As part of our ongoing efforts to enhance security, we will be updating the domains used for Help and downloads:

  • Help: https://www.emeditor.orghttps://help.emeditor.com
  • Downloads: https://download.emeditor.info/https://download.emeditor.com/

With this change, all of our official resources will be hosted on emeditor.com or its subdomains. When you see emeditor.com in the URL, you can be confident that the site is authentic and secure.

If you visit the current domains, you will be automatically redirected to the new ones, so no action is required on your part unless you are an IT administrator. This change is scheduled for May 4, 2026.

Note for IT Administrators

If your organization uses a firewall to control EmEditor downloads, please whitelist download.emeditor.com (ports 80 and 443) for the program eeupdate.exe to ensure uninterrupted delivery of updates.

See also “What are the EmEditor subdomains?

EmEditor Is Now Even More Secure to Download

EmEditor Is Now Even Safer and Easier to Get

The EmEditor desktop installer is now also available from the Microsoft Store.
The desktop installer available on the Microsoft Store is the same program for both EmEditor Professional and EmEditor Free (you get the same app and use it according to your license/usage).

We have also improved our official website (www.emeditor.com) so you can download EmEditor with greater peace of mind.

  • The EmEditor desktop installer is now available from the Microsoft Store.
  • Even if you cannot use the Microsoft Store, you can still download the desktop installer safely from our official website.
  • Our website has been rebuilt as a static HTML-based site, which helps reduce risks such as website tampering compared to a dynamic site.
  • This website is now hosted on Cloudflare Workers, giving us tightly controlled security. Cloudflare’s role‑based access control and enterprise-grade authentication standards help ensure only authorized changes are made, so you can trust that the content you see comes from us.

We will continue to provide only official installers through our website and other authorized distribution channels.
For your safety, please download EmEditor from trusted sources such as our official website or the Microsoft Store.

Download from Microsoft Store

Other downloads

New static, HTML-based websites

To reduce the security risks associated with WordPress, we’ve migrated our websites to static, HTML-based sites. As a result, the likelihood of future security incidents is expected to be extremely low.

As part of this transition, our forums are now available in read-only mode.

Thank you for your understanding.

[Important] Follow-up: Security Incident Notice Regarding the EmEditor Installer Download Link

Following our earlier announcement, “[Important] Security Incident Notice Regarding the EmEditor Installer Download Link”, we are sharing what we have learned through further investigation, along with additional details that supplement the previous notice.

We sincerely apologize once again for the serious concern and inconvenience this incident has caused.


1. Time Period Potentially Affected (U.S. Pacific Time / UTC)

In our previous notice, we provided the timeframe in U.S. Pacific Time. For reference, we also include Coordinated Universal Time (UTC).

  • Dec 19, 2025 18:39 – Dec 22, 2025 12:50 (U.S. Pacific Time)
  • 2025-12-20 02:39 – 2025-12-22 20:50 (UTC)

If you downloaded the installer during the period above via the EmEditor website download path (for example, the “Download Now” button), there is a possibility that you downloaded a file that was not the legitimate installer provided by us (Emurasoft, Inc.).

Please note that the period above is intentionally broad out of an abundance of caution. The actual window may have been shorter and limited to specific times.


2. About the Suspicious File (Confirmed Differences)

For the file emed64_25.4.3.msi, we have confirmed the existence of at least two suspicious files.

We also confirmed that both suspicious files were signed with Microsoft-issued digital signatures. Because the validity periods were extremely short (only a few days), we believe the certificates were likely issued in a manner similar to developer-oriented issuance.

We reported this incident to Microsoft, provided the suspicious files, and requested revocation of the relevant signatures. We have now confirmed that both signatures have been revoked. As a result, attempting to run the MSI should display a warning that the signature is invalid, making installation difficult.

Legitimate file (official EmEditor installer)

Problematic file #1

Problematic file #2


3. If You Already Deleted the Downloaded File

If you still have the downloaded file (emed64_25.4.3.msi), you can verify it (as previously announced) by checking the digital signature and/or SHA-256.

Even if you already deleted the file, Windows may have kept a copy of the MSI used during installation under C:\Windows\Installer, stored under a different name.

Because this folder is both hidden and protected by the OS, it can be difficult to locate through normal File Explorer browsing. Please open it directly by entering: C:\Windows\Installer.

After opening the folder, we recommend the steps below. Please be extremely careful not to double-click or run any MSI files.

  1. Sort by date (for example, “Date modified”)
  2. Focus on recent files
  3. Check the target file’s digital signature (Right-click → Properties → Digital Signatures)

4. How To Check whether Your Computer May be Infected

Even if the suspicious file was executed, infection is not guaranteed in environments such as:

  • The device was offline
  • A VPN/proxy was required
  • Suspicious PowerShell behavior was blocked by Windows features or policies
  • PowerShell execution was restricted
  • Antivirus/security software blocked the activity

However, if any of the following apply, the likelihood of infection becomes very high:

  • C:\ProgramData\tmp_mojo.log exists
  • A scheduled task named Google Drive Caching exists
  • background.vbs exists in %LOCALAPPDATA%\Google Drive Caching\
  • A browser extension named Google Drive Caching exists in a Chromium-based browser such as Chrome or Microsoft Edge (even if it claims to be made by Google)—especially if it can “read and change data on all websites” and has clipboard access
  • Network logs show connections to any of the following:
  • cachingdrive[.]com
  • emeditorde[.]com
  • emeditorgb[.]com
  • emeditorjp[.]com
  • emeditorsb[.]com

If none of the above apply, the risk is lower—but not zero—because part of the attack can run in memory and leave little or no file-based evidence.


5. Confirmed Behavior (Destination Domains, etc.)

As previously announced, we confirmed that the suspicious installer, when executed, downloads additional files from external domains and executes them.

While we previously confirmed access to emeditorjp[.]com, subsequent investigation has found additional access to emeditorde[.]com, emeditorgb[.]com, and emeditorsb[.]com as well.

None of these four domains (emeditorjp[.]com, emeditorde[.]com, emeditorgb[.]com, emeditorsb[.]com) are operated by us (Emurasoft, Inc.).

We also confirmed that the PowerShell command described in the previous notice downloads and executes files from external domains, and that this behavior could lead to malware infection and theft of personal information such as passwords.

For additional details, please refer to the research report prepared by Mr. Luca Palermo and Mr. Mario Ciccarelli. Mr. Palermo provided the report to us and granted permission for us to publish it, and we would like to express our sincere thanks for their cooperation.


6. Why This Was “Hard to Spot”

As a basic reality, both domains and digital signatures can be obtained by third parties under certain conditions.

  • Domains can often be purchased at low cost if they are unused or not renewed.
  • Code-signing certificates can generally be obtained from many certificate authorities (in this case, the issuer was Microsoft).
  • Once an issue is discovered, the main available response is to contact the issuer/certification authority and request revocation.

From a technical perspective, MSI installers can include arbitrary scripts (including PowerShell) via custom actions. With sufficient knowledge, an attacker can inject a malware loader into an installer that closely resembles a legitimate, widely distributed one.

Even if the installer were an EXE rather than an MSI, similar attacks would still be possible.

Unfortunately, this means it is difficult for software companies to completely prevent malicious installers that closely imitate legitimate ones from being created and distributed. We must assume that similarly sophisticated, multi-stage malware installers could appear again in the future.

That said, we believe the core issues in this incident can be summarized as follows:

  1. A convenient redirect (download path) used on our website was altered without being detected.
  2. A malicious installer was placed on our website by an external party.

Because these occurred together, we take full responsibility for the fact that customers were harmed after downloading from our official website, and we will reflect this in our future preventive measures.

6-1. Malicious files placed on the EmEditor website

In addition to the malicious installer emed64_25.4.3.msi, we discovered a file named base64.php under a plugin directory. After analyzing base64.php, we determined it was a typical backdoor (remote code execution / RCE).

We also found that a script had been added to footer.php (within the WordPress theme directory). This script hijacked clicks intended for the legitimate URL:

  • https://support.emeditor.com/ja/downloads/latest/installer/64

and redirected them to:

  • /wp-content/uploads/filebase/emeditor-core/emed64_25.4.3.msi

As a result, clicking the “Download Now” button on the homepage could lead to the malicious file being downloaded.

More maliciously, the script was configured to trigger only for visitors who were not logged in, making the issue difficult for administrators to reproduce and detect. As a result, even when we checked the site ourselves, we did not immediately notice that the redirect had been altered.


7. Cause (Current Assessment)

We are still investigating and have not reached a final conclusion. However, we are considering the possibilities below.

WordPress is made up of multiple components—core, plugins, themes, and more—maintained by many developers. Vulnerabilities are regularly discovered in these components, and updates are released over time.

We regularly update plugins and themes, but in some cases vulnerabilities may remain unpatched for extended periods. It is possible that the attack exploited such a vulnerability.

It is also possible that the SFTP account in use was targeted.


8. Our Response (Completed / Planned)

We immediately deleted the malicious file emed64_25.4.3.msi. We also reviewed file modification logs and confirmed the addition of base64[.]php and changes to footer[.]php. After identifying base64[.]php as a backdoor, we scanned the entire site.

We then rebuilt the website, reinstalled all plugins, and removed unnecessary plugins. We also scanned internal computers and changed login passwords for all WordPress sites and related services. We audited several services we used by looking through their logs.

In addition, we stopped using redirects for download buttons such as “Download Now,” and replaced them with direct links to verified safe files. We also updated the download page to clearly show the MSI’s SHA-256 and added instructions encouraging users to verify the digital signature.

To further strengthen the EmEditor homepage download path, we are also considering migrating the site to a custom/static website instead of WordPress in the near future.


9. Closing

As described above, an installer that has been tampered with can perform extremely dangerous actions when executed. At the same time, we cannot fundamentally prevent third parties from creating and distributing malicious installers that imitate legitimate ones.

Therefore, our top priority is to make sure no one can obtain malware through our website, since it’s our primary distribution channel.

This incident also reminded us that while popular CMS platforms such as Xoops and WordPress are convenient, their extensibility can increase exposure to vulnerabilities—and that simply keeping plugins and themes updated does not eliminate risk entirely.

Fortunately, the Emurasoft Customer Center was not compromised, and our database remained secure. We have no evidence that anyone accessed our customer database.

In the hope that what we learned from this incident will help other software companies, we have included as much detail and context as possible rather than limiting this to a brief report.

We once again offer our sincere apologies for the concern and inconvenience caused. We especially apologize to those who suffered harm related to infection.

Thank you for your continued support of EmEditor.

[Important] Security Incident Notice Regarding the EmEditor Installer Download Link

We regret to inform you that we have identified an incident involving the EmEditor official website’s download path (the [Download Now] button), where unauthorized modification by a third party is suspected. During the affected period, the installer downloaded via that button may not have been the legitimate file provided by us (Emurasoft, Inc.).

We sincerely apologize for the concern and inconvenience this may cause. Please review the information below.


1. Potentially Affected Period

  • Dec 19, 2025 18:39 – Dec 22, 2025 12:50 (U.S. Pacific Time)

If you downloaded the installer from the [Download Now] button on the EmEditor homepage during this period, it is possible that a different file without our digital signature was downloaded. This is a conservative estimate, and in reality the affected period may have been narrower and limited to a specific timeframe.


2. Incident Summary (High-Level Cause)

The [Download Now] button normally points to the following URL:

  • https://support.emeditor.com/en/downloads/latest/installer/64

This URL uses a redirect. However, during the affected period, the redirect settings appear to have been altered by a third party, resulting in downloads being served from the following (incorrect) URL:

  • …/uploads/filebase/emeditor-core/emed64_25.4.3.msi

This file was not created by Emurasoft, Inc., and it has already been removed.

As a result, we have confirmed that the downloaded file may be digitally signed not by us, but by another organization named WALSHAM INVESTMENTS LIMITED.

Note: This issue may not be limited to the English page and may affect similar URLs for other languages as well (including Japanese).


3. File Confirmed as Potentially Affected

At this time, the only file confirmed to be involved is:

  • emed64_25.4.3.msi

Legitimate file (official)

  • File name: emed64_25.4.3.msi
  • Size: 80,376,832 bytes
  • Digital signature: Emurasoft, Inc.
  • SHA-256: e5f9c1e9b586b59712cefa834b67f829ccbed183c6855040e6d42f0c0c3fcb3e

Suspicious file (possible tampering)

  • File name: emed64_25.4.3.msi
  • Size: 80,380,416 bytes
  • Digital signature: WALSHAM INVESTMENTS LIMITED

4. Not Affected

You are not affected if any of the following applies:

  • You updated via EmEditor’s Update Checker or through EmEditor’s automatic update
  • You downloaded directly from download.emeditor.info
    Example: https://download.emeditor.info/emed64_25.4.3.msi
  • You downloaded a file other than emed64_25.4.3.msi
  • You used the portable version
  • You used the store app version
  • You installed/updated using winget
  • You downloaded the file but did not run/execute it

5. How to Check and What to Do

If you may have downloaded the installer via [Download Now] during the affected period, please verify the digital signature and SHA-256 hash of the file emed64_25.4.3.msi.

5-1. How to check the Digital Signature (Windows)

  1. Right-click the file (emed64_25.4.3.msi) and select Properties.
  2. Open the Digital Signatures tab.
  3. Confirm that the signer is Emurasoft, Inc.
  • If it shows WALSHAM INVESTMENTS LIMITED, the file may be malicious.

If the “Digital Signatures” tab is not shown, the file may be unsigned or the signature may not be recognized. In that case, do not run the file; delete it and follow the guidance below.

5-2. How to check SHA-256 (Windows / PowerShell)

Open PowerShell and run:

Get-FileHash .\emed64_25.4.3.msi -Algorithm SHA256

Confirm the output SHA-256 matches:

  • Legitimate SHA-256:
    e5f9c1e9b586b59712cefa834b67f829ccbed183c6855040e6d42f0c0c3fcb3e

If the signature or SHA-256 does not match (Recommended actions)

If the digital signature is not Emurasoft, Inc. (e.g., it is WALSHAM INVESTMENTS LIMITED) or the SHA-256 does not match, you may have obtained a tampered file (potentially containing malware).

  • Immediately disconnect the affected computer from the network (wired/wireless)
  • Run a full malware scan on the system
  • Depending on the situation, consider refreshing/rebuilding the environment including the OS
  • Consider the possibility of credential exposure and change passwords used/stored on that device (and enable MFA where possible)

If you are using EmEditor in an organization, we also recommend contacting your internal security team (e.g., CSIRT) and preserving relevant logs where possible.


6. Observed Behavior (As Currently Confirmed)

The suspicious installer may attempt to run a powershell script, which downloads and executes content from emeditorjp[.]com.
emeditorjp[.]com is not a domain managed by Emurasoft, Inc.

Please also note that the installer may still proceed to install EmEditor normally and install legitimate EmEditor program files, which could make the issue difficult to notice.


7. Current Status and Next Updates

We are continuing to investigate the facts and determine the full scope of impact. We will provide updates on this page and/or through our official channels as soon as more information becomes available.
We take this incident very seriously and will implement necessary measures to identify the cause and prevent recurrence.

We sincerely apologize again for the inconvenience and concern this may have caused, and we appreciate your understanding and continued support of EmEditor.

License Price Update

We’ve worked hard to keep our annual subscription price low over the years. However, due to rising costs, we’ll be updating our pricing to ensure we can continue developing EmEditor and providing you with the best possible service. Starting August 28, 2025, the price of an annual subscription license will increase from US$48.00 to US$60.00. Volume license prices will be updated as well. The renewal price for annual subscriptions will be 75% of the new first-year price.

We’re also introducing a monthly subscription option for US$6 per month, available from August 28, 2025.

Prices in your country/region may be in your local currency.

For information on how to calculate the number of licenses you need, please see our guidelines.

We remain committed to continually improving EmEditor and supporting our customers.

Thank you for choosing EmEditor!

Introducing registration keys for Stripe

We are introducing registration keys for Stripe subscriptions. The new registration key works similarly to the existing registration keys. Simply use the same Register Product dialog box to enter your key. Alternatively, you can use the key in the installer parameters if needed.

Version Requirement

Please note that version 24.5.3 or later is required to use the Stripe registration key. Please update EmEditor to use the new registration keys for Stripe.

Accessing Your Registration Key

You can find your registration key in two ways:

Registration Key Format

The new Stripe registration key has a distinct format: r-xxxx-xxxx-xxxx-xxxx-xxxx, where x is a random character.

Help and Support

For detailed instructions on registering your Stripe subscription, please visit our help page: Signing into EmEditor with Stripe.

If you have any questions or encounter any issues, feel free to reach out to us through our Contact Us form. Thank you for your continued support.

EmEditor’s payment processor update

Update (1/7/25): Registration keys will be available for Stripe subscriptions.

We are excited to announce that EmEditor is transitioning to Stripe as our primary payment processor. This change reflects our commitment to improving your purchasing experience while maintaining the highest standards of security and privacy.

What’s changing

  • Payment processor: Stripe is the new payment processor for EmEditor subscription purchases.
  • Rollout plan: We will change the Buy Now link on the English website (emeditor.com) today to go to the Stripe payment page, followed by other languages in the coming weeks.
  • Current subscriptions: Existing 2Checkout subscriptions will remain active. Customers who prefer using 2Checkout can still use this link.
  • Other retailers: This change does not affect other retailers for EmEditor.

Why we chose Stripe

Improved payment options

Stripe supports a wide range of payment methods, including credit and debit cards, bank transfers, Apple Pay, Google Pay, and more.

Stripe supports Link, a secure autofill feature that saves your payment details for faster checkout.

User-friendly experience

With Stripe, you’ll enjoy a fast, intuitive checkout process. The Stripe portal allows you to conveniently manage your subscriptions.

Security and privacy

Your security remains our top priority. Stripe protects customer payment data with strict policies and advanced encryption with PCI DSS compliance.

How to use Stripe for purchases

Purchasing subscriptions

You can purchase subscriptions by going to emeditor.com and clicking on Buy Now. If you are logged into the Emurasoft Customer Center, your email address will be displayed on the Stripe payment page, confirming that the subscription will be linked to the correct user. To purchase for a new user, sign out of the customer center and manually enter the desired email address on the payment page.

You can change the quantity for your subscription by clicking on the “Qty” button in the left half of the screen.

Emails with subscription details

Within minutes after purchase, you’ll receive two emails from emurasoft.com: one with your subscription details and another with your receipt.

Registering EmEditor

After purchasing a subscription, you can register EmEditor by signing into EmEditor.

  1. Open EmEditor.
  2. Go to Help > Registration Information…
  3. Click Sign In/Enter Registration Information.
  4. Sign in with your Emurasoft Customer Center credentials to register with your new subscription.
  5. In Registration Information, ensure that your Subscription ID is displayed and that “Validation successful” appears below.

Registration key for Stripe

You can also register using a registration key, which you can get in two ways:

EmEditor version 24.5.3 or later is required for the new registration keys.

Offline registration

You can request an offline license if you would like to register offline.

Managing your subscription

Viewing your subscription

  1. Log into Emurasoft Customer Center.
  2. Navigate to the Stripe Subscriptions section to view your active subscriptions.

Making changes

  • Use the Stripe portal to manage your Stripe subscription or update your payment method.

Support and feedback

For assistance, please reach out through our Contact Us form. We also welcome your feedback about the Stripe integration to help us continue improving your experience.

We appreciate your continued support and trust in EmEditor. We remain committed to providing you with a secure, reliable, and user-friendly subscription experience.

License Price Update

We haven’t changed the price of an annual subscription since August 2022. However, due to rising costs, we need to adjust the price to sustain development and continue providing quality services to our customers. Therefore, starting August 28, 2024, we will increase the price of an annual subscription license from $40.00 to $48.00. Volume license prices will also be adjusted accordingly.

As previously announced, we will stop selling lifetime licenses on August 28, 2024. Additionally, the renewal price after the first year will increase from the current 50% of the first-year price to 75%, effective on August 28, 2024. If you plan to use EmEditor Professional long-term, you can save by purchasing lifetime licenses now. Alternatively, if you have subscription licenses, you can renew your subscription at the current price before August 28, 2024, without changing the expiration date.

Please also see how to calculate the number of licenses.

We will continue to develop EmEditor and provide support to our customers.

Thank you for using EmEditor!