Nation-State Actors Exploit Notepad++ Supply Chain
Between June and December 2025, state-sponsored threat group Lotus Blossom compromised the hosting infrastructure for Notepad++, allowing them to intercept and redirect update traffic. This enabled selective targeting of users primarily in Southeast Asian government, telecommunications and critical infrastructure sectors. Two infection chains were identified - one using Lua script injection to deliver Cobalt Strike and another using DLL side-loading for a Chrysalis backdoor. The campaign affected additional sectors across South America, US, Europe and Southeast Asia including cloud hosting, energy, financial, government, manufacturing and software development. The attack exploited insufficient verification in older versions of the Notepad++ updater to serve malicious installers to targeted victims.
Pulse ID: 698d2ac3b38a12b4cb5a2723
Pulse Link: https://otx.alienvault.com/pulse/698d2ac3b38a12b4cb5a2723
Pulse Author: AlienVault
Created: 2026-02-12 01:20:03
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Asia #BackDoor #Cloud #CobaltStrike #CyberSecurity #Europe #Government #InfoSec #LUA #Manufacturing #Notepad #OTX #OpenThreatExchange #RCE #SouthAmerica #SupplyChain #Telecom #Telecommunication #bot #AlienVault


