Get In Touch
541 Melville Ave, Palo Alto, CA 94301,
ask@ohio.clbthemes.com
Ph: +1.831.705.5448
Work Inquiries
work@ohio.clbthemes.com
Ph: +1.831.306.6725
Back

The State-Sponsored Hacking Playbook of 2026: Volt, Flax, and Now “Lotus Blossom”

Cybersecurity · February 6, 2026
The State-Sponsored Hacking Playbook of 2026: Volt, Flax, and Now “Lotus Blossom”

State attacks are no longer episodic. They are continuous, coordinated, and increasingly AI-augmented.

S

Sara Voss  ·  9 min read

cybersecurity protection network security shield defending digital infrastructure

Threat Level Dashboard — February 2026

🔴 CRITICAL
Lotus Blossom
Notepad++ supply chain hijack
🔴 CRITICAL
Volt Typhoon
US critical infrastructure pre-positioning
🟠 HIGH
Flax Typhoon
Taiwan / US / Europe since 2021
🟠 HIGH
Russia AI Attacks
GenAI-augmented FortiGate campaigns
82 ransomware incidents — Feb 2026
31% targeted healthcare
CVE-2026-21509 exploited in days

Lotus Blossom: The Updater as a Weapon

cybersecurity lock encryption data protection digital security

The most technically sophisticated new threat actor of early 2026 is Lotus Blossom — a Chinese-attributed group that hijacked the legitimate update channels for Notepad++, one of the most widely installed text editors on Windows. When users clicked “check for updates,” they received a signed, apparently authentic payload that was in fact a loader for Lotus Blossom’s tooling.

This is supply-chain exploitation at its most insidious: no phishing link, no suspicious attachment, no user error. Just a trusted software update from a trusted source that happened to have been compromised at the distribution layer.

Separately, the Chinese-nexus group UNC3886 — tracked separately from Lotus Blossom — was found to have infiltrated a major Singapore telecommunications provider, establishing persistent access to routing infrastructure. Also linked to Chinese intelligence: GlassWorm, a macOS-targeting campaign that compromised extension packages in the OpenVSX registry used by VS Code-compatible editors.

data breach hacker cybersecurity threat targeting enterprise systems

⚠️ Key Pattern

Lotus Blossom, UNC3886, and GlassWorm all exploit trust relationships — trusted software, trusted networks, trusted registries. Traditional perimeter defenses do not stop this class of attack.

data technology global network AI satellite view connectivity

Volt, Flax, Salt: China’s Three-Typhoon Strategy

CISA and the FBI have now formally attributed three distinct and simultaneously active Chinese state threat clusters operating against US and allied infrastructure:

⚡ Volt Typhoon
Pre-positioning in US critical infrastructure — power grids, water systems, communications. Designed for disruption on command, not immediate damage.
🌾 Flax Typhoon
Active since 2021 across Taiwan, US, and Europe. Focuses on espionage and intellectual property theft from defence and semiconductor sectors.
🧂 Salt Typhoon
Compromised multiple major US telecommunications providers. Capable of intercepting calls and messages at the carrier level — including from government officials.

The strategic picture is a coordinated layered attack surface: Salt Typhoon owns communications, Volt Typhoon owns physical infrastructure, Flax Typhoon owns long-term intelligence. These are not independent operations.

Russia’s AI Pivot: Generative Attacks at Scale

Russia’s state-linked threat actors have made a documented shift toward using generative AI to accelerate their offensive operations. The most notable example: AI-assisted campaigns targeting FortiGate firewall deployments, where LLM-generated variants of known exploits are being used to evade signature-based detection.

On the vulnerability side: CVE-2026-21509, a critical privilege-escalation flaw, was being actively exploited by Russian-linked actors within days of its public disclosure — demonstrating patch-lag weaponisation at speed not previously seen at this consistency.

CVE-2026-22769, affecting Dell RecoverPoint backup appliances, has been exploited since at least mid-2024 — meaning organisations running unpatched Dell backup infrastructure have potentially been compromised for over 18 months without detection. EU and Dutch government networks were also hit via Ivanti zero-days in the same reporting period.

New Malware Zoo: GridTide, Dohdoor, PromptSpy

Three newly classified malware families entered active tracking in early 2026:

⚡ GridTide
Targets industrial control systems in energy and utilities. Designed for persistent, low-noise access to OT networks.
🚪 Dohdoor
DNS-over-HTTPS backdoor. Uses encrypted DNS to exfiltrate data and receive commands, bypassing standard network monitoring.
🕵️ PromptSpy
First malware specifically designed to intercept prompts and responses from enterprise AI systems. Targets LLM API integrations and copilot deployments.

PromptSpy in particular represents a category shift: as organisations integrate AI into sensitive workflows, the attack surface extends to include AI inference pipelines, not just traditional data stores.

Healthcare Ransomware: The Collapse Risk

February 2026 recorded 82 confirmed ransomware incidents globally. Healthcare accounted for 31% of those — 25+ hospital systems, clinical networks, and patient data repositories hit in a single month.

The pattern is consistent: legacy medical devices running unpatched software, flat internal networks with minimal segmentation, and staff who are trained for patient care — not security hygiene. Ransomware groups know this. Healthcare pays or patients die.

The systemic risk is not that any single hospital goes offline. It is that coordinated attacks against regional healthcare networks — something Volt Typhoon-style pre-positioning could enable — could overwhelm emergency response capacity in ways that are indistinguishable from a natural disaster.

Threat Actor Reference Table

Threat Actor Target Sector Method Severity
Lotus Blossom Software users (Windows) Supply chain / updater hijack CRITICAL
Volt Typhoon US critical infrastructure Living-off-the-land pre-positioning CRITICAL
Flax Typhoon Defence, semiconductors Long-term espionage, IP theft HIGH
Salt Typhoon US telecoms carriers Carrier-level interception CRITICAL
UNC3886 Telecoms (Asia-Pacific) Routing infrastructure access CRITICAL
Russia (GRU-linked) Govt, firewalls, healthcare AI-augmented CVE exploitation HIGH

🛡️ Immediate Actions for IT Teams
  • Audit all auto-update mechanisms — verify signing certificates and update server integrity
  • Patch CVE-2026-21509 and CVE-2026-22769 immediately if Dell RecoverPoint or affected network devices are in scope
  • Segment OT/ICS networks; assume GridTide-style lateral movement is possible on flat networks
  • Review FortiGate configurations and apply vendor hardening guides — Russian AI campaigns specifically target default configs
  • Audit OpenVSX / VS Code extension installs on developer machines (GlassWorm vector)
  • Healthcare: implement offline backup validation; test restore procedures quarterly
  • Monitor for DNS-over-HTTPS exfiltration (Dohdoor); block unrecognised DoH resolvers at the network layer
  • Audit LLM API integrations for prompt interception risk (PromptSpy class attacks)

Stay ahead of state-sponsored threats

Sara Voss covers cybersecurity every week — no fluff, just actionable intelligence.

Read More at Networkcraft →

Sara Voss
https://networkcraft.net/author/sara-voss/
Investigative Tech Reporter at Networkcraft. The most important security story is usually the one nobody's covering yet. Specialises in cybersecurity, digital privacy, data breaches, and the policy decisions that shape how technology affects civil liberties.