Cyber Pulse Academy

Latest News
  • Home
  • /
  • News
  • /
  • Lotus Blossom’s Notepad++ Supply Chain Attack: A Deep Dive into the Chrysalis Backdoor

Lotus Blossom's Notepad++ Supply Chain Attack: A Deep Dive into the Chrysalis Backdoor



🚨 Executive Summary: The Notepad++ Supply Chain Attack

In mid-2025, a sophisticated attack targeted the popular open-source text editor Notepad++. The China-linked Lotus Blossom hacking group (also known as Billbug, Raspberry Typhoon) breached the software's hosting provider, hijacking update traffic to deliver a previously undocumented backdoor dubbed Chrysalis. This supply chain compromise went undetected for months, affecting users across APAC, South America, and Europe. By exploiting insufficient update verification in older Notepad++ versions, the attackers selectively redirected a fraction of users to malicious servers. This breach underscores the critical need for robust software update pipelines and defense-in-depth strategies. In this beginner-friendly breakdown, we’ll dissect the entire Notepad++ supply chain attack, map it to MITRE ATT&CK, and provide actionable blue-team defenses.


🕵️ MITRE ATT&CK Techniques Used in the Attack

The Lotus Blossom group employed a blend of tactics to maintain stealth and persistence. Below is a mapping of key techniques observed in the Notepad++ supply chain attack.

TacticTechnique IDTechnique NameHow It Was Used
Initial AccessT1195.001Supply Chain CompromiseBreached the hosting provider to modify Notepad++ update mechanism.
ExecutionT1204.002User Execution (Malicious File)Victims ran the trojanized update (update.exe) believing it was legitimate.
Defense EvasionT1574.002DLL Side-LoadingUsed legitimate Bitdefender binary (BluetoothService.exe) to load malicious log.dll.
Defense EvasionT1027Obfuscated Files/InfoChrysalis backdoor used encrypted shellcode and Microsoft Warbird obfuscation.
Command and ControlT1071.001Web ProtocolsBeacon contacted api.skycloudcenter[.]com over HTTP.
ImpactT1496Resource HijackingBackdoor allowed file exfiltration, interactive shell, and potential lateral movement.

Understanding these techniques helps defenders spot similar behaviors in their environment.


🌍 Real-World Scenario: Who Was in the Crosshairs?

The attackers didn’t spray malware indiscriminately, they selectively targeted high-value individuals and organizations. According to Rapid7 and Kaspersky telemetry, the Notepad++ supply chain attack victims included:

  • Individuals in Vietnam, El Salvador, and Australia.
  • A government organization in the Philippines.
  • A financial institution in El Salvador.
  • An IT service provider in Vietnam.
  • Broader sectors: telecom, government, and transportation across APAC and South America.

This targeting aligns with Lotus Blossom’s historic interest in political and economic intelligence. The group used the trusted Notepad++ update channel to slip past perimeter defenses, showing how supply chain attacks can bypass even strong security postures.


⚙️ Step-by-Step: How the Notepad++ Update Was Hijacked

The attack evolved over several months, with three distinct infection chains. Below is a simplified flow of how the Chrysalis backdoor reached victims.

Step 1: Hosting Provider Compromise (Initial Access)

Attackers breached Notepad++’s hosting provider (unknown entity) sometime before June 2025. They gained the ability to redirect update requests from specific IP ranges to attacker-controlled servers (infrastructure hijacking). The legitimate update mechanism (GUP.exe) was left intact, but the download URL was swapped.

Step 2: Malicious Update Delivery (Supply Chain)

When victims ran Notepad++ (versions prior to 8.8.9), the updater contacted the legitimate domain, but the request was transparently redirected to malicious IPs like 95.179.213[.]0. Users downloaded a trojanized NSIS installer named update.exe (or variants like install.exe, AutoUpdater.exe).

Step 3: DLL Side-Loading Execution (Defense Evasion)

The NSIS installer dropped two key files:

  • BluetoothService.exe – a renamed, legitimate Bitdefender binary.
  • log.dll – a malicious DLL.

When BluetoothService.exe executed, it sideloaded log.dll (DLL side-loading: T1574.002). The DLL then decrypted and launched the final payload shellcode.

Step 4: Chrysalis Backdoor & Cobalt Strike (Persistence & C2)

The decrypted shellcode installed the Chrysalis backdoor, a feature-rich implant capable of:

  • Collecting system info (whoami, tasklist, netstat).
  • Contacting C2 server api.skycloudcenter[.]com.
  • Spawning an interactive shell, file upload/download, self-uninstall.

Later variants also fetched a Cobalt Strike beacon via a Metasploit downloader. The attackers even used Microsoft Warbird (an undocumented obfuscation framework) to hide shellcode, borrowing code from a public PoC.

Kaspersky observed three infection chains with rotating C2s and downloader tweaks, showing the group’s agility. By December 2025, the hosting provider access was terminated and Notepad++ migrated to a new provider with stronger security.


✅ Common Mistakes & Best Practices

This breach offers lessons for both software maintainers and end users.

❌ Mistakes That Enabled the Attack

  • Insufficient update verification – Older Notepad++ versions didn’t cryptographically verify updates.
  • Weak hosting provider security – The provider lacked strict access controls and monitoring.
  • Lack of code signing – The updater didn’t enforce digital signatures for downloaded binaries.
  • Delayed disclosure – The compromise went undetected for nearly six months.

🛡️ Best Practices to Mitigate Supply Chain Risks

  • Implement code signing and verify signatures before applying updates.
  • Use multi-factor authentication (MFA) for all hosting infrastructure accounts.
  • Monitor outbound connections from updater processes for anomalies.
  • Adopt a zero-trust model – treat every update as untrusted until verified.
  • Keep software up-to-date (Notepad++ 8.8.9+ fixed the verification flaw).

🔴🔵 Red Team vs Blue Team Perspectives

🔴 Red Team (Attacker) View

  • Tactic: Target the software supply chain, one breach gives you many victims.
  • Technique: Use legitimate binaries (Bitdefender) to evade AppLocker/AV.
  • Obfuscation: Encrypt shellcode and leverage obscure APIs (Warbird) to bypass EDR.
  • Persistence: Maintain access by rotating C2s and using multiple payload variants.

🔵 Blue Team (Defender) View

  • Hunt for: Unsigned executables dropped by trusted updaters (e.g., gup.exe spawning update.exe).
  • Monitor: DLL loads from unusual paths (e.g., BluetoothService.exe loading log.dll).
  • Network: Alert on connections to known malicious IPs (45.76.155.202, 95.179.213.0).
  • Enforce: Application control – only allow signed binaries to run.

📊 Visual Attack Breakdown

Below is a simplified diagram of the Notepad++ supply chain infection chain. The visual shows how update traffic was hijacked and the subsequent DLL side-loading.

Notepad++ supply chain attack diagram showing update request redirection, malicious download, and DLL side-loading
Notepad++ supply chain attack timeline with three variants and C2 rotation MITRE ATT&CK techniques used in Notepad++ supply chain attack - T1195, T1574, T1027

❓ Frequently Asked Questions

What is the Lotus Blossom hacking group?

Lotus Blossom (aka Billbug, Raspberry Typhoon) is a China-linked APT group active since at least 2012. They focus on espionage targeting government, military, and technology sectors in Southeast Asia. They frequently use DLL side-loading and public exploit code.


How do I know if my system was affected?

Indicators include: presence of update.exe in Notepad++ folders, unexpected processes like BluetoothService.exe running, or network connections to 45.76.155.202 or 95.179.213.0. Use a memory scanner or EDR to check for Cobalt Strike beacons.


Is Notepad++ safe to use now?

Yes. The maintainers patched the update verification flaw in version 8.8.9 (December 2025) and moved to a new hosting provider. Ensure you’re running the latest version (8.8.9 or higher) and enable automatic updates.


What is Chrysalis backdoor?

Chrysalis is a custom implant that collects system info, provides remote shell, and can download additional payloads. It uses encrypted shellcode and was delivered via the malicious Notepad++ update.


Could this happen to other software?

Absolutely. Supply chain attacks are on the rise (e.g., SolarWinds, 3CX). Any software with an auto-update feature is a potential vector. That’s why defense in depth and update integrity checks are critical.


🔑 Key Takeaways

  • The Notepad++ supply chain attack was a sophisticated, multi-phase operation by Lotus Blossom using DLL side-loading and update hijacking.
  • Supply chain compromises are hard to detect, they abuse trusted relationships.
  • Code signing, integrity verification, and network monitoring are essential controls.
  • Understanding MITRE ATT&CK techniques (T1195, T1574, T1027) helps in building detection rules.
  • Always update software to the latest patched version and verify the source.

🚀 Call to Action

Now that you understand the mechanics of this attack, take action:

  • Check your Notepad++ version – Update to 8.8.9 or later immediately.
  • Review your software update pipelines – Do you verify signatures? Do you monitor update traffic?
  • Share this knowledge with your team to raise awareness about supply chain risks.
  • Explore our other guides on DLL side-loading detection and supply chain security best practices (internal links).

📚 External Resources for Further Reading:

© Cyber Pulse Academy. This content is provided for educational purposes only.

Always consult with security professionals for organization-specific guidance.

DONATE · SUPPORT

We keep threat intelligence free. No paywalls, no ads. Your donation directly funds server infrastructure, research, and tools. Every contribution - no matter the size - makes this platform sustainable.
100% of your support goes to the platform. No corporate sponsors, just the community.
ROOT::DONATE

Leave a Comment

Your email address will not be published. Required fields are marked *

Ask ChatGPT
Set ChatGPT API key
Find your Secret API key in your ChatGPT User settings and paste it here to connect ChatGPT with your Courses LMS website.
Certification Courses
Hands-On Labs
Threat Intelligence
Latest Cyber News
MITRE ATT&CK Breakdown
All Cyber Keywords

Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.

Choose the amount of donation by yourself.