In early February 2026, the developers of Notepad++ disclosed a previously unnoticed supply chain compromise affecting the application’s update infrastructure. The breach allowed attackers to distribute malicious updates disguised as legitimate software releases, resulting in targeted infections across multiple countries. The incident persisted for several months in 2025 and involved multiple evolving execution chains, making detection difficult and highlighting the risks associated with trusted software update mechanisms.
The attack originated from a hosting provider–level compromise of Notepad++’s update infrastructure, which occurred between June and September 2025. Although the hosting issue was reportedly resolved, attackers retained access to internal services until December 2025. Active malicious update deployments were observed from late July through late October 2025, after which no new infections were identified.
Rather than indiscriminate mass distribution, the attackers conducted a highly targeted campaign, infecting approximately a dozen systems. Victims included:
This selective targeting suggests a covert espionage-oriented operation rather than financially motivated malware distribution.
Attackers weaponized the legitimate Notepad++ updater process, delivering NSIS-based malicious installers from compromised update URLs. Because updates were retrieved and executed through trusted channels, victims had no immediate indication of compromise.
The report identifies three distinct infection chains, each introduced to evade detection:
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy