At a glance: New reporting has expanded the understanding of the Notepad++ supply‑chain compromise. Recent technical analysis and community‑sourced evidence show that the incident was a more advanced operation than previously assessed. Organizations can reassess their exposure, review logs for indicators of compromise, and apply the updated mitigations.
Threat summary
New analysis published on February 3, 2026, provides additional clarity on how threat actors leveraged the Notepad++ update mechanism. The latest findings confirm that the threat actors selectively manipulated Notepad++ auto‑update responses to deliver modified executables to specific IP address ranges, enabling them to collect reconnaissance data from targeted systems while avoiding broad detection.
The report by Securelist also shows that the activity was more diverse and technically complex than initially understood. Earlier assessments focused on activity in Asia, but the new analysis identifies victims in Vietnam, El Salvador, Australia, and the Philippines. Those affected included individuals, as well as a government organization, financial institution, and information technology service provider, indicating interest in those specific sectors and end users.
The adversaries used three distinct infection chains delivered through manipulated update responses, each executing reconnaissance commands, collecting system information, and uploading the results to a public file‑sharing service-a pattern. This matches a community observation from January 22, 2026, where a user reported the Notepad++ updater sending collected data to temp.sh, with Securelist’s findings indicating this activity was part of the same operation.
The malicious update files executed commands such as systeminfo, tasklist, and whoami, wrote the output to a temporary file, and uploaded it using curl.exe. The collected data included system configuration, running processes, user accounts, and network state.
Analysis & mitigation
The operation shows how the compromised update channel was used to profile systems and identify potential high‑value targets, highlighting continued threat actor interest in software supply‑chain access.
A thorough response to this threat would include:
- Reviewing endpoint logs for unexpected execution of systeminfo, tasklist, whoami, ipconfig, or netstat commands initiated by Notepad++.
- Investigating outbound connections to temp.sh or similar public file‑sharing services.
- Reinstalling the latest version of Notepad++ from a trusted source and updating to the latest version with signed update verification.
- Rotating credentials used on systems where reconnaissance activity may have occurred, reviewing DNS and network logs for redirected update traffic, and validating the integrity of Notepad++ binaries across managed environments.
- Monitoring for unauthorized use of curl.exe and reviewing temporary directories for reconnaissance files.
Field Effect MDR clients are well-protected with layered visibility across endpoints, network traffic, and post-compromise behavior that provides strong coverage against the tactics used in this type of supply-chain compromise.
Field Effect MDR users would be alerted via ARO if vulnerable versions or indicators of compromise are detected in their environment.