Bg Shape
Image

Why Supply Chain Attacks, Exploits, and Insider Access Keep Leading to Breaches

Robert Kehoe
Chief Technology Officer
Published:
February 9, 2026

This week’s Risk Radar covers a well-executed supply chain attack, confirmation that a Microsoft Office vulnerability is now being actively exploited, and another insider incident that reinforces why fundamentals still matter.

The common thread this week is simple: attackers are exploiting the gaps between what organisations think they have under control and what’s actually deployed in the real world.

Supply Chain Attack: Notepad++ Update Infrastructure

This week we saw a targeted supply chain attack involving Notepad++, a tool widely used by administrators and developers.

In this case, a state-sponsored actor compromised the infrastructure used to serve update manifest files and selectively redirected users from specific IP addresses to malicious downloads. From the user’s perspective, the update process looked legitimate. That’s what makes supply chain attacks so effective.

Notepad++ has since rolled out mitigations, including digital certificate signing, to reduce the risk of this happening again.

What this means in practice:
If you don’t know what software is deployed across your environment, you can’t defend it. A software bill of materials (SBOM) isn’t a compliance exercise, it’s the starting point for understanding exposure and responding quickly when something goes wrong.

Microsoft Office Vulnerability: Active Exploitation Confirmed

The Microsoft Office vulnerability discussed in last week’s review is now being actively exploited by the Russian state-linked group APT28 (Fancy Bear).

The attack uses specially crafted Office documents and does not rely on macros, which means it can bypass controls that depend on macro detection as an early warning signal. This reflects broader Active Directory exploitation techniques used by ransomware groups, where attackers rely on trusted systems and legitimate behaviour rather than obvious malware indicators to move deeper into an environment.

What this means in practice:
Critical vulnerabilities need to move to the front of the queue. Patching should be accelerated wherever possible, and where patching cannot be applied immediately, compensating controls need to be in place and verified. Assuming existing controls will catch it is not a strategy.

Insider Risk: Coinbase Contractor Breach

Coinbase disclosed another insider-related incident this week, where a contractor accessed and disclosed information relating to around 30 customers.

Coinbase has notified those affected, but the incident is another reminder that insider risk doesn’t always look malicious at first glance. It often starts with access that was too broad, lasted too long, or wasn’t being actively monitored.

What this means in practice:
Focus on the basics and keep them tight. Enforce least privilege, monitor access continuously, and use behavioural anomaly detection to spot activity that doesn’t fit normal patterns. These controls don’t just stop attackers, they limit the damage when something inevitably slips through.

Closing Perspective

None of the incidents discussed here involve new techniques or unfamiliar risks. They reflect basic controls failing under real operating conditions.

Supply chain attacks succeed when organisations don’t have clear visibility into the software they rely on. Exploits land when patching is delayed or assumptions are left untested. Insider incidents escalate when access is too broad and behaviour goes unmonitored.

These are not gaps that require new tools to fix. They require discipline and follow-through. Knowing what is deployed, prioritising what needs to be fixed first, testing recovery, and continuously reviewing access are unglamorous tasks, but they are the work that prevents small failures from turning into public incidents.

This is about tightening what already exists and making sure it holds when it matters.

Read Our Latest Blogs

Blog Image
Iran Cyber Activity Focuses on Industrial Systems and Data Leaks

Iran-linked cyber activity targets industrial systems, data leaks, and human vulnerabilities, with risk centred on access, exposure, and operational control

Blog Image
North Korean Supply Chain Attacks, Chrome Zero-Day Exploit, and Qilin EDR Bypass

An in-depth look at major cybersecurity threats including North Korean supply chain compromises, a critical Chrome zero-day exploit, and Qilin ransomware

Blog Image
Claude Mythos: What Security Leaders Should Take Away

AI models like Claude Mythos are accelerating vulnerability discovery and exploitation, compressing attack timelines and increasing pressure on defenders.

Bg ShapeBg Shape
BLOGS & INSIGHTS

Why Supply Chain Attacks, Exploits, and Insider Access Keep Leading to Breaches

Threat Actors and Campaigns
Supply Chain and Third Party Risks
Robert Kehoe
Chief Technology Officer
February 9, 2026

This week’s Risk Radar covers a well-executed supply chain attack, confirmation that a Microsoft Office vulnerability is now being actively exploited, and another insider incident that reinforces why fundamentals still matter.

The common thread this week is simple: attackers are exploiting the gaps between what organisations think they have under control and what’s actually deployed in the real world.

Supply Chain Attack: Notepad++ Update Infrastructure

This week we saw a targeted supply chain attack involving Notepad++, a tool widely used by administrators and developers.

In this case, a state-sponsored actor compromised the infrastructure used to serve update manifest files and selectively redirected users from specific IP addresses to malicious downloads. From the user’s perspective, the update process looked legitimate. That’s what makes supply chain attacks so effective.

Notepad++ has since rolled out mitigations, including digital certificate signing, to reduce the risk of this happening again.

What this means in practice:
If you don’t know what software is deployed across your environment, you can’t defend it. A software bill of materials (SBOM) isn’t a compliance exercise, it’s the starting point for understanding exposure and responding quickly when something goes wrong.

Microsoft Office Vulnerability: Active Exploitation Confirmed

The Microsoft Office vulnerability discussed in last week’s review is now being actively exploited by the Russian state-linked group APT28 (Fancy Bear).

The attack uses specially crafted Office documents and does not rely on macros, which means it can bypass controls that depend on macro detection as an early warning signal. This reflects broader Active Directory exploitation techniques used by ransomware groups, where attackers rely on trusted systems and legitimate behaviour rather than obvious malware indicators to move deeper into an environment.

What this means in practice:
Critical vulnerabilities need to move to the front of the queue. Patching should be accelerated wherever possible, and where patching cannot be applied immediately, compensating controls need to be in place and verified. Assuming existing controls will catch it is not a strategy.

Insider Risk: Coinbase Contractor Breach

Coinbase disclosed another insider-related incident this week, where a contractor accessed and disclosed information relating to around 30 customers.

Coinbase has notified those affected, but the incident is another reminder that insider risk doesn’t always look malicious at first glance. It often starts with access that was too broad, lasted too long, or wasn’t being actively monitored.

What this means in practice:
Focus on the basics and keep them tight. Enforce least privilege, monitor access continuously, and use behavioural anomaly detection to spot activity that doesn’t fit normal patterns. These controls don’t just stop attackers, they limit the damage when something inevitably slips through.

Closing Perspective

None of the incidents discussed here involve new techniques or unfamiliar risks. They reflect basic controls failing under real operating conditions.

Supply chain attacks succeed when organisations don’t have clear visibility into the software they rely on. Exploits land when patching is delayed or assumptions are left untested. Insider incidents escalate when access is too broad and behaviour goes unmonitored.

These are not gaps that require new tools to fix. They require discipline and follow-through. Knowing what is deployed, prioritising what needs to be fixed first, testing recovery, and continuously reviewing access are unglamorous tasks, but they are the work that prevents small failures from turning into public incidents.

This is about tightening what already exists and making sure it holds when it matters.

Robert Kehoe

Chief Technology Officer

Robert is CTO at Smarttech247, leading engineering strategy and delivery across cybersecurity products and services. With over 15 years’ experience in software and security, and CISSP certified, he has led large-scale cloud and security initiatives, including Cloud Protection for Salesforce. Robert focuses on measurable customer outcomes and building empowered, high-performing engineering teams.

Contents:

Ready to scale your security and compliance operations?

We protect your on-premise/cloud/OT environments - 24x7x365