Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Nation-State Actors Exploit Notepad++ Supply Chain

0
Medium
Published: Thu Feb 12 2026 (02/12/2026, 01:20:03 UTC)
Source: AlienVault OTX General

Description

Between June and December 2025, the state-sponsored threat group Lotus Blossom compromised the Notepad++ hosting infrastructure, enabling them to intercept and redirect update traffic. This supply chain attack targeted users primarily in Southeast Asian government, telecommunications, and critical infrastructure sectors but also affected organizations in South America, the US, Europe, and Southeast Asia across multiple industries. Two infection chains were used: Lua script injection delivering Cobalt Strike and DLL side-loading deploying the Chrysalis backdoor. The attack exploited insufficient verification in older Notepad++ updater versions to serve malicious installers selectively. Although no CVSS score is assigned, the attack's ability to compromise software updates and deploy advanced malware indicates a high severity. European organizations in energy, financial, government, manufacturing, cloud hosting, and software development sectors are at risk. Mitigation requires updating Notepad++ to versions with secure update verification, monitoring for unusual network traffic, and employing endpoint detection for Cobalt Strike and DLL side-loading techniques. Countries with significant critical infrastructure and software development presence, such as Germany, France, and the UK, are most likely affected. This campaign highlights the risks of supply chain compromises and the need for rigorous software update security.

AI-Powered Analysis

AILast updated: 02/19/2026, 11:56:31 UTC

Technical Analysis

The threat involves a sophisticated supply chain compromise of the Notepad++ software update infrastructure by the state-sponsored group Lotus Blossom between June and December 2025. By compromising the hosting infrastructure, the attackers were able to intercept and redirect update traffic, selectively delivering malicious installers to targeted victims. The attack exploited older versions of the Notepad++ updater that lacked sufficient verification mechanisms, allowing the insertion of malicious payloads without detection. Two distinct infection chains were identified: one leveraging Lua script injection to deploy Cobalt Strike, a widely used post-exploitation framework, and another using DLL side-loading to install the Chrysalis backdoor, enabling persistent remote access. The campaign primarily targeted Southeast Asian government, telecommunications, and critical infrastructure sectors but also impacted organizations in South America, the US, Europe, and Southeast Asia across cloud hosting, energy, financial, government, manufacturing, and software development sectors. The attackers' selective targeting and use of advanced malware tools indicate a high level of operational capability and intent to maintain stealth and persistence. The lack of a CVSS score notwithstanding, the attack's exploitation of a trusted software update mechanism and deployment of sophisticated malware poses significant risks to confidentiality, integrity, and availability of affected systems. The campaign underscores the critical importance of securing software supply chains and implementing robust update verification processes.

Potential Impact

For European organizations, this supply chain attack poses a significant threat to multiple critical sectors including energy, financial services, government agencies, manufacturing, cloud hosting providers, and software developers. Compromise of the Notepad++ update mechanism can lead to widespread deployment of backdoors and post-exploitation frameworks like Cobalt Strike, enabling attackers to conduct espionage, data exfiltration, and potentially disrupt critical infrastructure operations. The stealthy nature of the infection chains and selective targeting complicate detection and response efforts. Given Europe's reliance on digital infrastructure and interconnected supply chains, such an attack could undermine trust in software updates and cause cascading operational impacts. Additionally, regulatory and compliance implications arise from potential breaches of sensitive data and critical systems. The attack could also facilitate further lateral movement within networks, increasing the risk of ransomware or sabotage. Overall, the impact on confidentiality, integrity, and availability is substantial, especially for organizations that have not updated to secure versions of Notepad++ or lack advanced endpoint detection capabilities.

Mitigation Recommendations

1. Immediately update Notepad++ to the latest version that includes secure update verification mechanisms to prevent malicious installer acceptance. 2. Implement strict network monitoring to detect unusual update traffic redirection or unexpected connections to Notepad++ hosting domains. 3. Deploy endpoint detection and response (EDR) solutions capable of identifying Cobalt Strike activity and DLL side-loading techniques. 4. Conduct thorough audits of software update processes and supply chain security to identify and remediate weaknesses. 5. Employ application whitelisting to prevent unauthorized DLLs from loading within critical applications. 6. Educate IT and security teams on indicators of compromise related to Lua script injection and Chrysalis backdoor behaviors. 7. Use multi-factor authentication and least privilege principles to limit attacker lateral movement post-compromise. 8. Collaborate with software vendors and threat intelligence providers to stay informed about emerging supply chain threats and patches. 9. Regularly back up critical data and test incident response plans to ensure rapid recovery in case of compromise. 10. Consider network segmentation to isolate critical infrastructure and sensitive environments from general user workstations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://unit42.paloaltonetworks.com/notepad-infrastructure-compromise/"]
Adversary
Lotus Blossom
Pulse Id
698d2ac3b38a12b4cb5a2723
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash869b85d8004b64fbef4d4ae9d4b20f00
hashd7ffd7b588880cf61b603346a3557e7cce648c93
hasha511be5164dc1122fb5a7daa3eef9467e43d8458425b15a640235796006590c9
hash2080584340e914d6466917c0c1b97e19
hash23e52d35b0a744b06b8f27e5350a96cb
hash363dad6a0cbf5784837ea99b6a9004c6
hash391286de28124839623d788eef201ac9
hash92580701bb44921383f1b7973824fab9
hashaa36d1c28e143f963b8f7ed98582ee4f
hashae6fbf9566dc352644613f17043cd9e9
hashb8f9aa523ab6d92ff4fa785d649234bf
hashe70adea04a3d0792aeca14426e3fa663
hashebfb90b0f9404b7c92bb968341c9a8cb
hash1c83ace9b078597beba0369ef2801503c36fd37c
hash1f178a63a87dcb339174e2cd22cf559ddbe72c24
hash242eebb5cb52a4f8c32f6295a687889445cc9da7
hash2c587cf2f79d12d40bdd5d910b7e5f4d7fbb690a
hash458b7557f3f10fcbec46558d306f4e95ede8531a
hashd2a6f306a9c4de523bf223466e860f7a8063677f
hashdaa56d1ae132105732db51a692927bb8ebee7495
hashe7b577a487ccf2ca1e7697a08a525e7197a7e238
hashe7e72971c5de989dcbd7246fc98b3b3a43983a5e
hasheaf46c1cff17458b28bfd2fef41045de0bdbf4c3
hash05abc57952974d08feafa399d6fdb37945a3fd0a10f37833dd837a5788e421d5
hash1f6d28370f4c2b13f3967b38f67f77eee7f5fba9e7743b6c66a8feb18ae8f33e
hash2dd5473736ef51e4340cae005e3fc8cdf0e42ec649bc6ed186484a79be409928
hash32aa12d3c9521477a5a1e086e400ec0f77f8a97a8190806a0f1953688b883cfb
hash49d2531893b09cb6a8e3429ca0a734e871a2d96fa2575c0eec3229d383fa233a
hash61c3077b989e272117167c90fc35e7f06bea4f992f3395b40ccee083d7258082
hash7094a07167648628e47249a16d9d6db922e5aa1255ac4322a2e4900d233372dd
hash71431fa7b66f8132453e18e3a5f8ef0af3ca079a7793f828df06fdb5d7bd915d
hash8117c82a3821965d92ee3f9f3ae10efcd602bd4b6e52a2fe957d70aafe479744
hasha19aa1cd7ecb9ca3f1fd0e118fffd0d673fba404ced8c39c2e210a63b70f9c15
hasha3cf1c86731703043b3614e085b9c8c224d4125370f420ad031ad63c14d6c3ec
hashe1df78704001bba1a3d343f62a1242a4484ff6ad269170714263c03b802eb0b1

Ip

ValueDescriptionCopy
ip59.110.7.32

Url

ValueDescriptionCopy
urlhttp://45.32.144.255/update/update.exe
urlhttp://45.76.155.202/update/update.exe
urlhttp://95.179.213.0/update/AutoUpdater.exe
urlhttp://95.179.213.0/update/Upgrade.exe

Threat ID: 698d9e94c9e1ff5ad8b362f4

Added to database: 2/12/2026, 9:34:12 AM

Last enriched: 2/19/2026, 11:56:31 AM

Last updated: 2/20/2026, 10:10:56 PM

Views: 348

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats