FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Substack and Coinbase Breached Amid Malicious Notepad++ Update

Gregory Zuckerman
Last updated: February 6, 2026 3:12 pm
By Gregory Zuckerman
Technology
6 Min Read
SHARE

Three high-profile security incidents landed at once, underscoring how fragile our digital plumbing can be: Substack disclosed exposure of user contact data, Coinbase confirmed a breach tied to contractor access, and the update channel for Notepad++ was hijacked to deliver a tainted build to select targets.

Together, they illustrate the modern breach trifecta: customer data leakage, insider or partner misuse, and software supply-chain subversion.

Table of Contents
  • Substack Contact Data Exposed in Targeted Access Incident
  • Coinbase Contractor Insider Access Abused to View Data
  • Notepad++ Update Distribution Channel Reportedly Hijacked
  • Why These Incidents Matter for Users and Organizations
  • What Users Should Do Now to Reduce Breach Fallout Risk
  • What Companies Must Do Next to Harden Security Posture
A white bookmark icon with three horizontal lines at the top, centered on an orange and white gradient background with subtle diagonal lines and dots.

Substack Contact Data Exposed in Targeted Access Incident

The newsletter platform said phone numbers and email addresses were accessed, while payment details and passwords were not. The company notified affected users and contained the intrusion, but contact data alone is potent fuel for phishing, SIM-swap attempts, and targeted harassment.

What it means for users: expect more realistic emails and texts that cite your subscriptions to trick you into “reconfirming” credentials. Rotate any reused passwords, enable two-factor authentication, and consider switching recovery options away from SMS where possible.

Coinbase Contractor Insider Access Abused to View Data

Coinbase reported that a contractor’s access was exploited to query internal tools and view data tied to a limited set of customers. Attackers even shared screenshots in a Telegram channel to prove access to balances and support dashboards. The exchange says the exposure has been locked down and impacted users alerted.

For crypto holders, this raises two urgent checks: review sign-in history and connected apps, and revoke unused API keys. Turn on hardware security keys or passkeys for login, enable withdrawal whitelists, and add transaction notifications. If you run trading bots, rotate keys and minimize scopes to read-only unless absolutely required.

Notepad++ Update Distribution Channel Reportedly Hijacked

The developer of Notepad++ said attackers targeted the domain used to distribute updates, redirecting some users to a malicious build. Because the editor does not auto-update by default, the blast radius appears small, but the operation looks tailored—consistent with state-aligned tradecraft focused on specific individuals.

This is a textbook software supply-chain risk: you don’t need to compromise the source code if you can tamper with the path between developer and user. Similar tactics were seen in incidents such as 3CX and SolarWinds, where trusted distribution points became the attack vector.

Why These Incidents Matter for Users and Organizations

Breaches increasingly hinge on people and dependencies. Verizon’s Data Breach Investigations Report has repeatedly found that roughly three-quarters of breaches involve the human element, from phishing to misuse of credentials. Once inside, attackers move quickly—CrowdStrike’s reporting puts median breakout times around an hour—so small lapses compound fast.

Substack, Coinbase breached amid malicious Notepad++ update

In parallel, supply-chain compromise remains a force multiplier. Code-signing, DNS integrity, certificate management, and update infrastructure are now as critical as the code itself. A single weak link can bypass even diligent endpoint hygiene.

What Users Should Do Now to Reduce Breach Fallout Risk

Change passwords for Substack and Coinbase if you reuse them anywhere, then enable phishing-resistant MFA such as passkeys or hardware security keys. Avoid SMS codes if alternatives exist, and double-check recovery emails and phone numbers for accuracy.

On Coinbase, review API keys, connected services, and withdrawal protections. Turn on address books and time-delayed withdrawals where available. Monitor account alerts closely and consider lowering per-transaction limits.

For Notepad++ and other apps, verify downloads via vendor checksums or digital signatures before installing. Prefer in-app update mechanisms that verify signatures, or trusted package managers. If you updated recently and notice anomalies, run an antivirus scan and consider restoring from a known-good backup.

Stay alert for targeted phishing that references your newsletter subscriptions or crypto activity. Legitimate support will not ask for seeds, recovery phrases, or full SMS codes outside of a login you initiate.

What Companies Must Do Next to Harden Security Posture

Enforce least privilege and just-in-time access for contractors, with session recording on sensitive support tools. Segment internal dashboards, apply strong conditional access, and conduct rapid access reviews after any anomaly. Rotate credentials and API tokens on a strict schedule.

Harden update and domain infrastructure: registry locks for critical domains, DNSSEC where supported, continuous certificate transparency monitoring, and mandatory code-signing with reproducible builds. Map and manage dependencies via a software bill of materials aligned with NIST’s Secure Software Development Framework, and adopt CISA’s Secure by Design principles.

The throughline in all three cases is clear: attackers will take the easiest path, whether that’s a help desk login, a contact database, or a hijacked update server. Reducing those paths—one control at a time—is the only sustainable defense.

Gregory Zuckerman
ByGregory Zuckerman
Gregory Zuckerman is a veteran investigative journalist and financial writer with decades of experience covering global markets, investment strategies, and the business personalities shaping them. His writing blends deep reporting with narrative storytelling to uncover the hidden forces behind financial trends and innovations. Over the years, Gregory’s work has earned industry recognition for bringing clarity to complex financial topics, and he continues to focus on long-form journalism that explores hedge funds, private equity, and high-stakes investing.
Latest News
EDU Unlimited Offers Lifetime Learning For $19.97
Backlash Erupts as OpenAI Retires GPT-4o Companion
Spotify Requires Premium For Developer Mode API
Google Contacts To Add Calling Cards Shortcut
Android Phones Show Longer Life And Faster Charging
Nintendo Confirms Labo VR Will Not Support Virtual Boy
AI Agents Launch Religion Social Network And Hire Humans
What IT Teams Need to Know Before Setting Up Office 365 Hybrid
Sony Confirms Launch for Redesigned WF-1000XM6 Earbuds
iPhone 17e Set To Launch This Month With Four Upgrades
ChatGPT 5.3 Codex Helped Build Itself, Says OpenAI
Samsung Teases Bespoke AI Jet Bot Steam Ultra
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.