Notepad++ is one of the most widely used source‑code editors in the world, with millions of installations across government, industry and academia. Its popularity makes it an attractive target for attackers seeking to compromise large numbers of endpoints with a single, low‑effort vector. In a recent report published by AlienVault on 12 February 2026, the security community was warned that a state‑sponsored threat group, Lotus Blossom, had successfully hijacked the Notepad++ hosting infrastructure to deliver malicious updates to users in Southeast Asian government and critical infrastructure sectors. This post provides a detailed threat overview, technical analysis, and actionable recommendations for security analysts and defenders.
Threat Context
Between June and December 2025, Lotus Blossom compromised the hosting environment that serves Notepad++ installers and update packages. By intercepting and redirecting update traffic, the group was able to inject malicious payloads into otherwise legitimate software updates. The campaign was narrowly focused on civilian government institutions within the executive and legislative branches, deliberately excluding diplomatic and judicial entities. However, the attack spread beyond the initial target set, affecting cloud hosting, energy, financial, manufacturing, and software development organizations across South America, the United States, Europe, and Southeast Asia.
Technical Delivery Mechanisms
Two distinct infection chains were identified:
- Lua Script Injection – Lotus Blossom inserted a Lua script into the Notepad++ update package that executed on installation. The script acted as a dropper, downloading and launching Cobalt Strike, a popular adversary‑in‑the‑middle (AIM) framework. Once installed, Cobalt Strike provided the attackers with remote command execution, lateral movement capabilities, and persistence on compromised systems.
- DLL Side‑Loading – In a second chain, the attackers bundled a malicious DLL named Chrysalis.dll alongside the Notepad++ installer. When the installer executed, the operating system loaded the DLL from a non‑trusted path, giving the backdoor full control over the victim’s machine. Chrysalis was designed to evade detection by masquerading as a legitimate component of the application.
Both chains exploited an insufficient verification process in older versions of the Notepad++ updater. The updater failed to validate the integrity of the downloaded installer against a trusted signature, allowing the attackers to replace the legitimate package with a malicious one without triggering client‑side security checks.
Targeted Sectors and Geographical Reach
While the campaign’s primary focus was on Southeast Asian government agencies, the attackers leveraged the same malicious updater to spread to other sectors. The full scope included:
- Government – Executive and legislative branches
- Telecommunications – Network infrastructure and service providers
- Critical Infrastructure – Energy, water, and transportation systems
- Cloud Hosting – Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) providers
- Financial – Banks and payment processors
- Manufacturing – Industrial control systems and automation platforms
- Software Development – Integrated development environments and build systems
Geographically, the attack impacted nodes in Southeast Asia, South America, the United States, and Europe, demonstrating the global reach of supply‑chain attacks when an attacker controls a widely used software distribution channel.
Indicators of Compromise (IOCs)
Security analysts should monitor for the following IOCs:
- Unusual outbound connections to the Notepad++ update servers or IP ranges associated with the compromised hosting infrastructure.
- HTTP traffic containing Lua script signatures or references to
luasandboxmodules. - Presence of Chrysalis.dll in the Notepad++ installation directory, especially if the file size deviates from the legitimate version.
- Execution of Cobalt Strike beacon traffic – look for known beacon patterns such as DNS tunneling or encrypted payloads on uncommon ports.
- Unexpected changes to the updater’s digital signature validation logic or missing cryptographic checks.
Detection Recommendations
- Endpoint Detection and Response (EDR) – Deploy EDR solutions that can flag the execution of unknown DLLs in system directories and detect Lua script execution within installers.
-
Network Traffic Analysis (NTA) – Implement NTA to spot anomalous update traffic, especially connections to external IPs that host the Notepad++ installers.
-
File Integrity Monitoring (FIM) – Monitor the integrity of application binaries. Any modification to Notepad++ binaries should trigger an alert.
-
Threat Hunting – Search for indicators of Cobalt Strike and Chrysalis backdoor activity, such as the presence of beacon logs or unusual DLLs in memory.
Mitigation Strategies
-
Update Validation – Enforce strict update validation by checking the cryptographic signature of Notepad++ installers against a trusted key. If the signature is missing or mismatched, block the installation.
-
Software Bill of Materials (SBOM) – Maintain an SBOM for all software assets. Compare the SBOM against the installed binaries to detect unauthorized changes.
-
Network Segmentation – Isolate critical infrastructure and government endpoints from the broader network. Limit the ability of an attacker to move laterally if a single endpoint is compromised.
-
Least Privilege and Application Whitelisting – Restrict installation privileges to administrators only and employ application whitelisting to prevent execution of unauthorized installers.
-
Patch Management – Apply the latest Notepad++ updates promptly, ensuring that any fixes to the updater’s verification process are in place. Consider using a trusted third‑party repository to reduce the risk of supply‑chain tampering.
-
Security Awareness Training – Educate users about the risks of installing software from unverified sources and encourage them to verify update signatures manually when feasible.
Conclusion
Lotus Blossom’s exploitation of Notepad++ demonstrates how a compromised software supply chain can serve as a launchpad for state‑sponsored attacks against high‑value targets. By leveraging Lua script injection and DLL side‑loading, the adversary was able to deliver sophisticated backdoors to a wide range of organizations across multiple continents. The key takeaway for security analysts is the importance of rigorous update validation, continuous monitoring for unusual installer activity, and a robust supply‑chain security posture. Implementing the mitigation strategies outlined above will reduce the attack surface and help defend against similar future threats.