Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsLotus Blossom Hackers Breach Official Notepad++ Hosting Infrastructure
Lotus Blossom Hackers Breach Official Notepad++ Hosting Infrastructure
CybersecurityDefense

Lotus Blossom Hackers Breach Official Notepad++ Hosting Infrastructure

•February 16, 2026
0
GBHackers On Security
GBHackers On Security•Feb 16, 2026

Companies Mentioned

Bitdefender

Bitdefender

Microsoft

Microsoft

MSFT

Rapid7

Rapid7

RPD

Why It Matters

The breach demonstrates how compromising a trusted software update channel can grant attackers persistent, privileged access to critical infrastructure, reshaping supply‑chain risk for enterprises globally.

Key Takeaways

  • •Lotus Blossom hijacked Notepad++ update hosting infrastructure.
  • •Attack delivered trojanized NSIS installers via compromised WinGUp.
  • •Cobalt Strike beacons and Chrysalis backdoor used for espionage.
  • •Victims include government, telecom, finance, energy, and software sectors.
  • •Notepad++ issued hardened updates; users must upgrade to 8.9.1+.

Pulse Analysis

The Lotus Blossom intrusion underscores a growing trend of state‑backed actors exploiting software supply chains rather than direct network breaches. By compromising the shared hosting provider that delivered Notepad++ updates, the group turned a ubiquitous developer utility into a stealthy delivery vector for espionage payloads. Because Notepad++ is frequently run on privileged jump hosts and administrative workstations, a malicious update can bypass perimeter defenses and gain immediate footholds within high‑value environments. This approach mirrors recent incidents targeting package managers and container registries, highlighting the need for continuous verification of every code‑origin point.

The technical chain began with an outdated WinGUp updater that failed to enforce strict certificate and signature checks. Attackers injected a forged NSIS installer named update.exe, which executed a Lua script to pull a Cobalt Strike beacon and performed DLL sideloading against Bitdefender’s BluetoothService.exe, loading a malicious log.dll that deployed the Chrysalis backdoor. Chrysalis employs custom API hashing, Warbird‑style code protection, and stealth persistence, allowing it to remain hidden from conventional AV signatures. Multi‑stage infection, combined with low‑profile beaconing to IPs 45.76.155.202 and 45.32.144.255, enabled long‑term data exfiltration across diverse sectors.

The incident forced the Notepad++ maintainers to relocate their infrastructure and harden the update pipeline, introducing certificate validation, signed XML responses, and a mandatory upgrade to version 8.9.1. Organizations should audit their third‑party tool update mechanisms, enforce signed‑updates policies, and monitor for anomalous gup.exe or update.exe activity. As supply‑chain attacks become more precise, enterprises must integrate real‑time telemetry, zero‑trust network segmentation, and threat‑intel feeds to detect malicious download patterns before they reach end users. Proactive hardening of update ecosystems will be a decisive factor in limiting future espionage campaigns.

Lotus Blossom Hackers Breach Official Notepad++ Hosting Infrastructure

By Mayura Kathir · February 16, 2026

Between June and December 2025, a state‑sponsored threat group known as Lotus Blossom quietly hijacked the official hosting infrastructure used to deliver Notepad++ updates, turning a trusted developer tool into a precision‑espionage delivery channel.

By compromising the shared hosting provider that previously served the Notepad++ update endpoint, the attackers gained the ability to intercept and redirect update traffic without modifying Notepad++’s source code. This infrastructure‑level access allowed them to selectively tamper with update responses and send malicious installers only to high‑value targets instead of the broader user base.

The attackers abused weaknesses in older versions of the WinGUp updater, which did not strictly verify the certificate and signature of downloaded installers. When targeted victims attempted to update Notepad++, they were silently redirected to attacker‑controlled servers and received trojanized NSIS installers (often named update.exe) in place of legitimate packages.

These installers initiated multi‑stage infection chains that used DLL sideloading and Lua script execution to deploy advanced payloads while blending in with normal Windows and security‑software behavior.

Notepad++ Infrastructure

Unit 42 and other researchers describe two primary attack chains in this campaign:

  1. A malicious NSIS installer executed a Lua script that downloaded and ran a Cobalt Strike Beacon, providing the operators with flexible post‑exploitation capabilities for lateral movement and data theft.

  2. The attackers abused a legitimate Bitdefender BluetoothService.exe component via DLL sideloading to load a malicious log.dll library that decrypted and executed a custom backdoor referred to as Chrysalis.

Threat Hunting Queries (Source : Unit42)

Chrysalis incorporates techniques such as Microsoft Warbird‑style code protection, custom API hashing, and stealthy persistence to evade traditional antivirus and behavior‑based detections.

Telemetry from Rapid7 and Unit 42 shows that the activity extended beyond the initially reported Southeast Asian government and telecom targets into additional sectors and regions. Victims included government, telecommunications, cloud hosting, energy, financial services, manufacturing, and software‑development organizations across Southeast Asia, South America, the U.S., and Europe.

Network activity associated with the campaign included staged command‑and‑control traffic and malicious update downloads from attacker infrastructure such as 45.76.155[.]202 and 45.32.144[.]255, with beaconing occurring shortly after delivery of update.exe and continuing over time.

Why Notepad++ Users Matter

Notepad++ is a lightweight, open‑source text editor widely used by system administrators, network engineers, and DevOps teams to edit configuration files, inspect large log datasets, and review code on sensitive jump hosts where heavier IDEs are impractical. Compromising the update path for such a tool effectively lets attackers ride along with privileged users, bypassing many perimeter controls and gaining a foothold deep inside core infrastructure environments.

This campaign reflects a broader strategic shift by state‑aligned actors away from broad infrastructure disruption toward long‑term, low‑profile access focused on administrative key‑holders and operational data.

In response, the Notepad++ project has moved its website to a new, more secure hosting provider and hardened its update mechanism. Version 8.8.9 of Notepad++ introduced enhanced WinGUp logic that verifies both the certificate and the digital signature of downloaded installers, while newer versions sign update XML responses using XMLDSig with stricter validation to be enforced starting in 8.9.2.

Recommendation: Users are strongly advised to install at least version 8.9.1 from the official site manually, ensure updates are retrieved only over trusted channels, and review endpoint telemetry for suspicious gup.exe behavior, unexpected update.exe executions, or anomalous connections to known campaign infrastructure.

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...