Soerensen 2 hours ago
What's concerning is the 6-month window. Supply chain attacks are difficult to detect because the malicious code runs with full user permissions from a "trusted" source. Most endpoint protection isn't designed to flag software from a legitimate publisher's update infrastructure.
For organizations, this argues for staged rollouts and network monitoring for unexpected outbound connections from common applications. For individuals, package managers with cryptographic verification at least add another barrier - though obviously not bulletproof either.
ashishb 2 hours ago
There is no reason for a tool to implicitly access my mounted cloud drive directory and browser cookies data.
nightshift1 8 minutes ago
indigodaddy 27 minutes ago
Someone1234 2 hours ago
yodon 37 minutes ago
troad 2 hours ago
Willish42 2 hours ago
Naive question, but isn't this relatively safe information to expose for this level of attack? I guess the idea is to find systems vulnerable to 0-day exploits and similar based on this info? Still, that seems like a lot of effort just to get this data.
Erlangen an hour ago
Could this be the attacker? The scan happened before the hack was first exposed on the forum.
porise 2 hours ago
tonymet 2 hours ago
https://arstechnica.com/security/2026/02/notepad-updater-was...
I recommend removing notepad++ and installing via winget which installs the EXE directly without the winGUP updater service.
Here's an AI summary explaining who is affected.
Affected Versions: All versions of Notepad++ released prior to version 8.8.9 are considered potentially affected if an update was initiated during the compromise window.
Compromise Window: Between June 2025 and December 2, 2025.
Specific Risk: Users running older versions that utilized the WinGUp update tool were vulnerable to being redirected to malicious servers. These servers delivered trojanized installers containing a custom backdoor dubbed Chrysalis.
bluenose69 2 hours ago