Lotus Blossom Hackers Breach Official Notepad++ Hosting Infrastructure

Lotus Blossom Hackers Breach Official Notepad++ Hosting Infrastructure

GBHackers On Security
GBHackers On SecurityFeb 16, 2026

Why It Matters

The breach demonstrates how compromising a trusted software update channel can grant attackers persistent, privileged access to critical infrastructure, reshaping supply‑chain risk for enterprises globally.

Key Takeaways

  • Lotus Blossom hijacked Notepad++ update hosting infrastructure.
  • Attack delivered trojanized NSIS installers via compromised WinGUp.
  • Cobalt Strike beacons and Chrysalis backdoor used for espionage.
  • Victims include government, telecom, finance, energy, and software sectors.
  • Notepad++ issued hardened updates; users must upgrade to 8.9.1+.

Pulse Analysis

The Lotus Blossom intrusion underscores a growing trend of state‑backed actors exploiting software supply chains rather than direct network breaches. By compromising the shared hosting provider that delivered Notepad++ updates, the group turned a ubiquitous developer utility into a stealthy delivery vector for espionage payloads. Because Notepad++ is frequently run on privileged jump hosts and administrative workstations, a malicious update can bypass perimeter defenses and gain immediate footholds within high‑value environments. This approach mirrors recent incidents targeting package managers and container registries, highlighting the need for continuous verification of every code‑origin point.

The technical chain began with an outdated WinGUp updater that failed to enforce strict certificate and signature checks. Attackers injected a forged NSIS installer named update.exe, which executed a Lua script to pull a Cobalt Strike beacon and performed DLL sideloading against Bitdefender’s BluetoothService.exe, loading a malicious log.dll that deployed the Chrysalis backdoor. Chrysalis employs custom API hashing, Warbird‑style code protection, and stealth persistence, allowing it to remain hidden from conventional AV signatures. Multi‑stage infection, combined with low‑profile beaconing to IPs 45.76.155.202 and 45.32.144.255, enabled long‑term data exfiltration across diverse sectors.

The incident forced the Notepad++ maintainers to relocate their infrastructure and harden the update pipeline, introducing certificate validation, signed XML responses, and a mandatory upgrade to version 8.9.1. Organizations should audit their third‑party tool update mechanisms, enforce signed‑updates policies, and monitor for anomalous gup.exe or update.exe activity. As supply‑chain attacks become more precise, enterprises must integrate real‑time telemetry, zero‑trust network segmentation, and threat‑intel feeds to detect malicious download patterns before they reach end users. Proactive hardening of update ecosystems will be a decisive factor in limiting future espionage campaigns.

Lotus Blossom Hackers Breach Official Notepad++ Hosting Infrastructure

Comments

Want to join the conversation?

Loading comments...