The routine process of updating software, often seen as a fundamental step in maintaining digital hygiene, was cunningly transformed into a weapon for espionage in a sophisticated campaign targeting users of the popular open-source text editor, Notepad++. For a period of six months in 2025, a highly skilled advanced persistent threat (APT) actor, believed to be the Chinese state-sponsored group known as Lotus Blossom, managed to hijack the application’s update mechanism. This operation was not a widespread, indiscriminate attack but a meticulously targeted strike aimed at specific, high-value entities across several critical sectors. By compromising the update delivery infrastructure, the attackers could selectively push malicious payloads disguised as legitimate software updates, achieving deep infiltration into sensitive networks while remaining largely undetected. The campaign serves as a stark reminder of the vulnerabilities inherent in software supply chains and how even the most trusted tools can be subverted for intelligence gathering by determined nation-state adversaries.
1. Anatomy of a Sophisticated Compromise
The threat actors initiated their attack by compromising a shared hosting server responsible for managing Notepad++ update requests, allowing them to intercept and manipulate the update process for a select group of users. Instead of a broad-spectrum attack that would quickly raise alarms, the operators employed a filtering system, likely based on IP address ranges, to single out their intended victims. When a targeted user’s application checked for an update, the compromised server redirected the request to a malicious server under the attackers’ control. This server then delivered a trojanized installer containing a previously undocumented and feature-rich backdoor dubbed “Chrysalis.” To evade detection, the malware was packaged within an NSIS installer and leveraged complex execution techniques. The core of its evasion strategy was a sophisticated DLL sideloading method that abused a legitimate, albeit renamed, Bitdefender Submission Wizard executable (BluetoothService.exe) to load a malicious DLL, which in turn decrypted and executed the final shellcode payload.
This highly selective approach enabled the espionage campaign to maintain a low profile while successfully infiltrating its prime targets across East Asia and other regions. Security analysts have detailed at least three distinct infection chains used throughout the six-month operation, underscoring the attackers’ adaptability and persistence. The list of victims included individuals and organizations within the telecommunications, government, aviation, and media sectors. Specifically, the campaign was observed targeting a government organization in the Philippines, a financial institution in El Salvador, and an IT service provider in Vietnam, along with various individuals in Vietnam, El Salvador, and Australia. By focusing their efforts on approximately a dozen machines belonging to these high-value targets, the operators minimized their risk of discovery and maximized the strategic value of the intelligence they could gather. This precision targeting highlights a shift towards more focused and stealthy operations designed for long-term intelligence gathering rather than widespread disruption.
2. Unpacking the Supply Chain Threat
The success of this campaign underscores the significant and growing threat to software supply chain security, as compromising a single trusted vendor can provide attackers with a powerful distribution channel to infiltrate countless downstream targets. In this instance, by poisoning the Notepad++ updates, the attackers effectively bypassed many conventional security controls. Because software updates are typically executed with elevated privileges, the malicious payload was installed with the same level of trust as a legitimate application, granting it deep system access. This privileged position made it feasible for the threat actors to conduct a wide range of post-exploitation activities, including extensive network reconnaissance, credential harvesting, and lateral movement to other systems within the target network. Ultimately, the primary goal was likely to achieve persistent Remote Code Execution (RCE) on developer workstations, which are often treasure troves of sensitive code, credentials, and access to critical infrastructure.
The incident prompted an immediate response from the Notepad++ development team, who worked to secure their infrastructure and patch the exploited vulnerability. The flaw that allowed for the malicious redirection was addressed in a release in November 2025, and by December of that year, the attackers’ access to the hosting environment was reportedly terminated. For organizations that rely on Notepad++ and other third-party software, this event served as a critical lesson in digital resilience. The primary recommendation for users was to immediately update to version 8.9.1 or a later release to ensure the patch was applied. Furthermore, security experts stressed the importance of adopting a zero-trust mindset toward all software updates, implementing robust mechanisms to verify the integrity of update channels, and thoroughly vetting the security practices of all third-party hosting and CDN providers. This forward-looking defensive posture, combined with regular threat hunting around trusted network paths and well-rehearsed incident response plans, was identified as essential for mitigating the risk of similar supply chain attacks in the future.






