ISI is sharing this notice to inform customers of a recently disclosed third-party software risk involving Notepad++.
The Notepad++ vendor confirmed that a portion of its update distribution infrastructure was temporarily compromised. During the affected period, some systems that downloaded or updated Notepad++ may have received software that did not originate from a trusted source.
Public reporting indicates this activity was selective rather than widespread. Even so, this represents a software supply chain risk, and ISI is addressing it proactively to reduce potential exposure and maintain system integrity.
The vendor has since completed remediation and released Notepad++ version 8.9.1, which is confirmed to be a trusted and clean release. ISI is standardizing on this version to ensure a consistent and defensible security baseline across supported environments.
Third-party software update mechanisms are a known attack vector. When update integrity cannot be fully guaranteed, even limited exposure creates unnecessary risk.
Standardizing on a verified version of Notepad++ helps:
For customers operating in environments managed by ISI, remediation activities are being handled through coordinated security and IT efforts.
This is a preventive measure. No customer action is required unless specifically directed by ISI.
Current actions include:
Customers may notice brief update activity or short service interruptions while the update completes.
Guidance:
For customers who manage their own IT environments, this notice is provided for awareness and planning.
The Notepad++ vendor disclosed a temporary compromise of its update distribution infrastructure. Systems that updated during the affected period from untrusted sources may have been exposed to unauthorized or modified software.
The vendor has remediated the issue and released version 8.9.1 as a trusted update.
Customers should review their environments and, as appropriate:
If an endpoint cannot be confidently validated, customers should treat the situation as a potential security incident. This may include isolating the device, investigating for persistence or unauthorized activity, and reimaging from a known-clean baseline if needed.
Customers with questions about this notice or their environment are encouraged to contact ISI through standard support channels:
Email: support@dodsecurity.com
Phone: 202-792-3042
Stay safe and stay vigilant.
— ISI Cyber Security Team