Supply Chain Alert: Notepad++ Update Mechanism Hijacked — What Organizations Need to Know
In late 2025 and early 2026, a widely used open-source utility became the target of a sophisticated supply chain attack that highlights a growing category of threat: hijacking trusted update mechanisms to deliver malware. The team behind Notepad++, one of the most popular lightweight text and code editors in the world, publicly disclosed that attackers had compromised its update infrastructure, allowing malicious update traffic to be served to selected users for months. What Happened? Between June and December 2025, attackers were able to intercept and redirect update traffic from Notepad++ installations to unauthorized, attacker-controlled infrastructure. This did not involve exploiting flaws in Notepad++'s core application code. Instead, the compromise occurred at the infrastructure level used to deliver software updates. By manipulating the Notepad++ updater (WinGUp), the attackers were able to redirect update checks to malicious servers that delivered rogue executables rather than legitimate installers. This type of attack bypasses many…
