Nation-State Actors Exploit Notepad++ Supply Chain
Between June and December 2025, the state-sponsored threat group Lotus Blossom compromised the Notepad++ hosting infrastructure, enabling them to intercept and redirect update traffic. This supply chain attack targeted users primarily in Southeast Asian government, telecommunications, and critical infrastructure sectors but also affected organizations in South America, the US, Europe, and Southeast Asia across multiple industries. Two infection chains were used: Lua script injection delivering Cobalt Strike and DLL side-loading deploying the Chrysalis backdoor. The attack exploited insufficient verification in older Notepad++ updater versions to serve malicious installers selectively. Although no CVSS score is assigned, the attack's ability to compromise software updates and deploy advanced malware indicates a high severity. European organizations in energy, financial, government, manufacturing, cloud hosting, and software development sectors are at risk. Mitigation requires updating Notepad++ to versions with secure update verification, monitoring for unusual network traffic, and employing endpoint detection for Cobalt Strike and DLL side-loading techniques. Countries with significant critical infrastructure and software development presence, such as Germany, France, and the UK, are most likely affected. This campaign highlights the risks of supply chain compromises and the need for rigorous software update security.
AI Analysis
Technical Summary
The threat involves a sophisticated supply chain compromise of the Notepad++ software update infrastructure by the state-sponsored group Lotus Blossom between June and December 2025. By compromising the hosting infrastructure, the attackers were able to intercept and redirect update traffic, selectively delivering malicious installers to targeted victims. The attack exploited older versions of the Notepad++ updater that lacked sufficient verification mechanisms, allowing the insertion of malicious payloads without detection. Two distinct infection chains were identified: one leveraging Lua script injection to deploy Cobalt Strike, a widely used post-exploitation framework, and another using DLL side-loading to install the Chrysalis backdoor, enabling persistent remote access. The campaign primarily targeted Southeast Asian government, telecommunications, and critical infrastructure sectors but also impacted organizations in South America, the US, Europe, and Southeast Asia across cloud hosting, energy, financial, government, manufacturing, and software development sectors. The attackers' selective targeting and use of advanced malware tools indicate a high level of operational capability and intent to maintain stealth and persistence. The lack of a CVSS score notwithstanding, the attack's exploitation of a trusted software update mechanism and deployment of sophisticated malware poses significant risks to confidentiality, integrity, and availability of affected systems. The campaign underscores the critical importance of securing software supply chains and implementing robust update verification processes.
Potential Impact
For European organizations, this supply chain attack poses a significant threat to multiple critical sectors including energy, financial services, government agencies, manufacturing, cloud hosting providers, and software developers. Compromise of the Notepad++ update mechanism can lead to widespread deployment of backdoors and post-exploitation frameworks like Cobalt Strike, enabling attackers to conduct espionage, data exfiltration, and potentially disrupt critical infrastructure operations. The stealthy nature of the infection chains and selective targeting complicate detection and response efforts. Given Europe's reliance on digital infrastructure and interconnected supply chains, such an attack could undermine trust in software updates and cause cascading operational impacts. Additionally, regulatory and compliance implications arise from potential breaches of sensitive data and critical systems. The attack could also facilitate further lateral movement within networks, increasing the risk of ransomware or sabotage. Overall, the impact on confidentiality, integrity, and availability is substantial, especially for organizations that have not updated to secure versions of Notepad++ or lack advanced endpoint detection capabilities.
Mitigation Recommendations
1. Immediately update Notepad++ to the latest version that includes secure update verification mechanisms to prevent malicious installer acceptance. 2. Implement strict network monitoring to detect unusual update traffic redirection or unexpected connections to Notepad++ hosting domains. 3. Deploy endpoint detection and response (EDR) solutions capable of identifying Cobalt Strike activity and DLL side-loading techniques. 4. Conduct thorough audits of software update processes and supply chain security to identify and remediate weaknesses. 5. Employ application whitelisting to prevent unauthorized DLLs from loading within critical applications. 6. Educate IT and security teams on indicators of compromise related to Lua script injection and Chrysalis backdoor behaviors. 7. Use multi-factor authentication and least privilege principles to limit attacker lateral movement post-compromise. 8. Collaborate with software vendors and threat intelligence providers to stay informed about emerging supply chain threats and patches. 9. Regularly back up critical data and test incident response plans to ensure rapid recovery in case of compromise. 10. Consider network segmentation to isolate critical infrastructure and sensitive environments from general user workstations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
Indicators of Compromise
- hash: 869b85d8004b64fbef4d4ae9d4b20f00
- hash: d7ffd7b588880cf61b603346a3557e7cce648c93
- hash: a511be5164dc1122fb5a7daa3eef9467e43d8458425b15a640235796006590c9
- hash: 2080584340e914d6466917c0c1b97e19
- hash: 23e52d35b0a744b06b8f27e5350a96cb
- hash: 363dad6a0cbf5784837ea99b6a9004c6
- hash: 391286de28124839623d788eef201ac9
- hash: 92580701bb44921383f1b7973824fab9
- hash: aa36d1c28e143f963b8f7ed98582ee4f
- hash: ae6fbf9566dc352644613f17043cd9e9
- hash: b8f9aa523ab6d92ff4fa785d649234bf
- hash: e70adea04a3d0792aeca14426e3fa663
- hash: ebfb90b0f9404b7c92bb968341c9a8cb
- hash: 1c83ace9b078597beba0369ef2801503c36fd37c
- hash: 1f178a63a87dcb339174e2cd22cf559ddbe72c24
- hash: 242eebb5cb52a4f8c32f6295a687889445cc9da7
- hash: 2c587cf2f79d12d40bdd5d910b7e5f4d7fbb690a
- hash: 458b7557f3f10fcbec46558d306f4e95ede8531a
- hash: d2a6f306a9c4de523bf223466e860f7a8063677f
- hash: daa56d1ae132105732db51a692927bb8ebee7495
- hash: e7b577a487ccf2ca1e7697a08a525e7197a7e238
- hash: e7e72971c5de989dcbd7246fc98b3b3a43983a5e
- hash: eaf46c1cff17458b28bfd2fef41045de0bdbf4c3
- hash: 05abc57952974d08feafa399d6fdb37945a3fd0a10f37833dd837a5788e421d5
- hash: 1f6d28370f4c2b13f3967b38f67f77eee7f5fba9e7743b6c66a8feb18ae8f33e
- hash: 2dd5473736ef51e4340cae005e3fc8cdf0e42ec649bc6ed186484a79be409928
- hash: 32aa12d3c9521477a5a1e086e400ec0f77f8a97a8190806a0f1953688b883cfb
- hash: 49d2531893b09cb6a8e3429ca0a734e871a2d96fa2575c0eec3229d383fa233a
- hash: 61c3077b989e272117167c90fc35e7f06bea4f992f3395b40ccee083d7258082
- hash: 7094a07167648628e47249a16d9d6db922e5aa1255ac4322a2e4900d233372dd
- hash: 71431fa7b66f8132453e18e3a5f8ef0af3ca079a7793f828df06fdb5d7bd915d
- hash: 8117c82a3821965d92ee3f9f3ae10efcd602bd4b6e52a2fe957d70aafe479744
- hash: a19aa1cd7ecb9ca3f1fd0e118fffd0d673fba404ced8c39c2e210a63b70f9c15
- hash: a3cf1c86731703043b3614e085b9c8c224d4125370f420ad031ad63c14d6c3ec
- hash: e1df78704001bba1a3d343f62a1242a4484ff6ad269170714263c03b802eb0b1
- ip: 59.110.7.32
- url: http://45.32.144.255/update/update.exe
- url: http://45.76.155.202/update/update.exe
- url: http://95.179.213.0/update/AutoUpdater.exe
- url: http://95.179.213.0/update/Upgrade.exe
Nation-State Actors Exploit Notepad++ Supply Chain
Description
Between June and December 2025, the state-sponsored threat group Lotus Blossom compromised the Notepad++ hosting infrastructure, enabling them to intercept and redirect update traffic. This supply chain attack targeted users primarily in Southeast Asian government, telecommunications, and critical infrastructure sectors but also affected organizations in South America, the US, Europe, and Southeast Asia across multiple industries. Two infection chains were used: Lua script injection delivering Cobalt Strike and DLL side-loading deploying the Chrysalis backdoor. The attack exploited insufficient verification in older Notepad++ updater versions to serve malicious installers selectively. Although no CVSS score is assigned, the attack's ability to compromise software updates and deploy advanced malware indicates a high severity. European organizations in energy, financial, government, manufacturing, cloud hosting, and software development sectors are at risk. Mitigation requires updating Notepad++ to versions with secure update verification, monitoring for unusual network traffic, and employing endpoint detection for Cobalt Strike and DLL side-loading techniques. Countries with significant critical infrastructure and software development presence, such as Germany, France, and the UK, are most likely affected. This campaign highlights the risks of supply chain compromises and the need for rigorous software update security.
AI-Powered Analysis
Technical Analysis
The threat involves a sophisticated supply chain compromise of the Notepad++ software update infrastructure by the state-sponsored group Lotus Blossom between June and December 2025. By compromising the hosting infrastructure, the attackers were able to intercept and redirect update traffic, selectively delivering malicious installers to targeted victims. The attack exploited older versions of the Notepad++ updater that lacked sufficient verification mechanisms, allowing the insertion of malicious payloads without detection. Two distinct infection chains were identified: one leveraging Lua script injection to deploy Cobalt Strike, a widely used post-exploitation framework, and another using DLL side-loading to install the Chrysalis backdoor, enabling persistent remote access. The campaign primarily targeted Southeast Asian government, telecommunications, and critical infrastructure sectors but also impacted organizations in South America, the US, Europe, and Southeast Asia across cloud hosting, energy, financial, government, manufacturing, and software development sectors. The attackers' selective targeting and use of advanced malware tools indicate a high level of operational capability and intent to maintain stealth and persistence. The lack of a CVSS score notwithstanding, the attack's exploitation of a trusted software update mechanism and deployment of sophisticated malware poses significant risks to confidentiality, integrity, and availability of affected systems. The campaign underscores the critical importance of securing software supply chains and implementing robust update verification processes.
Potential Impact
For European organizations, this supply chain attack poses a significant threat to multiple critical sectors including energy, financial services, government agencies, manufacturing, cloud hosting providers, and software developers. Compromise of the Notepad++ update mechanism can lead to widespread deployment of backdoors and post-exploitation frameworks like Cobalt Strike, enabling attackers to conduct espionage, data exfiltration, and potentially disrupt critical infrastructure operations. The stealthy nature of the infection chains and selective targeting complicate detection and response efforts. Given Europe's reliance on digital infrastructure and interconnected supply chains, such an attack could undermine trust in software updates and cause cascading operational impacts. Additionally, regulatory and compliance implications arise from potential breaches of sensitive data and critical systems. The attack could also facilitate further lateral movement within networks, increasing the risk of ransomware or sabotage. Overall, the impact on confidentiality, integrity, and availability is substantial, especially for organizations that have not updated to secure versions of Notepad++ or lack advanced endpoint detection capabilities.
Mitigation Recommendations
1. Immediately update Notepad++ to the latest version that includes secure update verification mechanisms to prevent malicious installer acceptance. 2. Implement strict network monitoring to detect unusual update traffic redirection or unexpected connections to Notepad++ hosting domains. 3. Deploy endpoint detection and response (EDR) solutions capable of identifying Cobalt Strike activity and DLL side-loading techniques. 4. Conduct thorough audits of software update processes and supply chain security to identify and remediate weaknesses. 5. Employ application whitelisting to prevent unauthorized DLLs from loading within critical applications. 6. Educate IT and security teams on indicators of compromise related to Lua script injection and Chrysalis backdoor behaviors. 7. Use multi-factor authentication and least privilege principles to limit attacker lateral movement post-compromise. 8. Collaborate with software vendors and threat intelligence providers to stay informed about emerging supply chain threats and patches. 9. Regularly back up critical data and test incident response plans to ensure rapid recovery in case of compromise. 10. Consider network segmentation to isolate critical infrastructure and sensitive environments from general user workstations.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://unit42.paloaltonetworks.com/notepad-infrastructure-compromise/"]
- Adversary
- Lotus Blossom
- Pulse Id
- 698d2ac3b38a12b4cb5a2723
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash869b85d8004b64fbef4d4ae9d4b20f00 | — | |
hashd7ffd7b588880cf61b603346a3557e7cce648c93 | — | |
hasha511be5164dc1122fb5a7daa3eef9467e43d8458425b15a640235796006590c9 | — | |
hash2080584340e914d6466917c0c1b97e19 | — | |
hash23e52d35b0a744b06b8f27e5350a96cb | — | |
hash363dad6a0cbf5784837ea99b6a9004c6 | — | |
hash391286de28124839623d788eef201ac9 | — | |
hash92580701bb44921383f1b7973824fab9 | — | |
hashaa36d1c28e143f963b8f7ed98582ee4f | — | |
hashae6fbf9566dc352644613f17043cd9e9 | — | |
hashb8f9aa523ab6d92ff4fa785d649234bf | — | |
hashe70adea04a3d0792aeca14426e3fa663 | — | |
hashebfb90b0f9404b7c92bb968341c9a8cb | — | |
hash1c83ace9b078597beba0369ef2801503c36fd37c | — | |
hash1f178a63a87dcb339174e2cd22cf559ddbe72c24 | — | |
hash242eebb5cb52a4f8c32f6295a687889445cc9da7 | — | |
hash2c587cf2f79d12d40bdd5d910b7e5f4d7fbb690a | — | |
hash458b7557f3f10fcbec46558d306f4e95ede8531a | — | |
hashd2a6f306a9c4de523bf223466e860f7a8063677f | — | |
hashdaa56d1ae132105732db51a692927bb8ebee7495 | — | |
hashe7b577a487ccf2ca1e7697a08a525e7197a7e238 | — | |
hashe7e72971c5de989dcbd7246fc98b3b3a43983a5e | — | |
hasheaf46c1cff17458b28bfd2fef41045de0bdbf4c3 | — | |
hash05abc57952974d08feafa399d6fdb37945a3fd0a10f37833dd837a5788e421d5 | — | |
hash1f6d28370f4c2b13f3967b38f67f77eee7f5fba9e7743b6c66a8feb18ae8f33e | — | |
hash2dd5473736ef51e4340cae005e3fc8cdf0e42ec649bc6ed186484a79be409928 | — | |
hash32aa12d3c9521477a5a1e086e400ec0f77f8a97a8190806a0f1953688b883cfb | — | |
hash49d2531893b09cb6a8e3429ca0a734e871a2d96fa2575c0eec3229d383fa233a | — | |
hash61c3077b989e272117167c90fc35e7f06bea4f992f3395b40ccee083d7258082 | — | |
hash7094a07167648628e47249a16d9d6db922e5aa1255ac4322a2e4900d233372dd | — | |
hash71431fa7b66f8132453e18e3a5f8ef0af3ca079a7793f828df06fdb5d7bd915d | — | |
hash8117c82a3821965d92ee3f9f3ae10efcd602bd4b6e52a2fe957d70aafe479744 | — | |
hasha19aa1cd7ecb9ca3f1fd0e118fffd0d673fba404ced8c39c2e210a63b70f9c15 | — | |
hasha3cf1c86731703043b3614e085b9c8c224d4125370f420ad031ad63c14d6c3ec | — | |
hashe1df78704001bba1a3d343f62a1242a4484ff6ad269170714263c03b802eb0b1 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip59.110.7.32 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://45.32.144.255/update/update.exe | — | |
urlhttp://45.76.155.202/update/update.exe | — | |
urlhttp://95.179.213.0/update/AutoUpdater.exe | — | |
urlhttp://95.179.213.0/update/Upgrade.exe | — |
Threat ID: 698d9e94c9e1ff5ad8b362f4
Added to database: 2/12/2026, 9:34:12 AM
Last enriched: 2/19/2026, 11:56:31 AM
Last updated: 2/20/2026, 10:10:56 PM
Views: 348
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Android threats using GenAI usher in a new era
MediumMaltrail IOC for 2026-02-20
MediumFBI: $20 Million Losses Caused by 700 ATM Jackpotting Attacks in 2025
MediumPromptSpy Android Malware Abuses Gemini AI at Runtime for Persistence
MediumThreatFox IOCs for 2026-02-19
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.