Executive Summary
In June 2025, the Chinese state-sponsored group Lotus Blossom compromised the update infrastructure of Notepad++, a widely used open-source text editor. By infiltrating the hosting provider's server, the attackers selectively redirected update requests from targeted users to malicious servers, delivering trojanized installers embedded with a custom backdoor named Chrysalis. This sophisticated supply chain attack persisted until December 2025, affecting users in sectors such as government, telecommunications, and financial services. (cyberscoop.com)
This incident underscores the escalating threat of supply chain attacks, where trusted software distribution channels are exploited to infiltrate targeted systems. Organizations must enhance their software supply chain security measures to mitigate such risks. (orca.security)
Why This Matters Now
The Notepad++ compromise highlights the increasing sophistication of state-sponsored supply chain attacks, emphasizing the urgent need for organizations to fortify their software update mechanisms and verify the integrity of third-party software to prevent similar breaches. (cybernews.com)
Attack Path Analysis
The Lotus Blossom APT group compromised Notepad++'s update mechanism, allowing them to deploy a custom backdoor to targeted users. They escalated privileges by exploiting authentication weaknesses in the update client. Utilizing Windows Management Instrumentation (WMI), they moved laterally within networks to execute commands on remote systems. Command and control were maintained through legitimate cloud services like Dropbox and Twitter, facilitating stealthy communication. While no bulk data exfiltration was observed, selective data access and reconnaissance were conducted. The primary impact was long-term espionage access, enabling strategic intelligence collection.
Kill Chain Progression
Initial Compromise
Description
The attackers compromised Notepad++'s update mechanism, allowing them to deploy a custom backdoor to targeted users.
MITRE ATT&CK® Techniques
Techniques identified for SEO/filtering; may be expanded with full STIX/TAXII enrichment later.
Supply Chain Compromise: Compromise Software Supply Chain
Valid Accounts
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Command and Scripting Interpreter: Windows Command Shell
Ingress Tool Transfer
Application Layer Protocol: Web Protocols
Archive Collected Data: Archive via Utility
Encrypted Channel
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
NIST Cybersecurity Framework (CSF) 2.0 – Integrity Checking Mechanisms
Control ID: PR.DS-6
ISO/IEC 27001:2022 – Restrictions on Changes to Software Packages
Control ID: A.14.2.4
PCI DSS 4.0 – Change Control Processes
Control ID: 6.4.1
ISO 28000:2022 – Security Management System
Control ID: 4.2.3
NIS2 Directive – Supply Chain Security
Control ID: Article 21(2)(d)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Supply chain compromise targeting Notepad++ affects software development workflows, requiring enhanced zero trust segmentation and egress security controls.
Information Technology/IT
IT administrators using compromised Notepad++ face lateral movement risks and command & control threats requiring multicloud visibility solutions.
Government Administration
China-based espionage targeting developer tools creates strategic intelligence collection risks requiring encrypted traffic controls and threat detection capabilities.
Telecommunications
Critical infrastructure operators using affected software face selective exploitation risks demanding inline IPS protection and anomaly response systems.
Sources
- China-based espionage group compromised Notepad++ for six monthshttps://cyberscoop.com/china-espionage-group-lotus-blossom-attacks-notepad/Verified
- Notepad++ update server hijacked in targeted attacks — outfit claims Chinese state-sponsored hackers may be to blamehttps://www.tomshardware.com/tech-industry/cyber-security/notepad-update-server-hijacked-in-targeted-attacksVerified
- Kaspersky GReAT uncovers hidden attack chains in Notepad++ supply chain compromisehttps://www.kaspersky.com/about/press-releases/kaspersky-great-uncovers-hidden-attack-chains-in-notepad-supply-chain-compromiseVerified
- Notepad++ Supply Chain Hack Conducted by China via Hosting Providerhttps://www.securityweek.com/notepad-supply-chain-hack-conducted-by-china-via-hosting-provider/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Aviatrix Zero Trust CNSF is pertinent to this incident as it could have limited the attacker's ability to move laterally and exfiltrate data by enforcing strict segmentation and identity-aware policies.
Control: Cloud Native Security Fabric (CNSF)
Mitigation: The attacker's ability to deploy a backdoor through the compromised update mechanism would likely be constrained, reducing the risk of initial compromise.
Control: Zero Trust Segmentation
Mitigation: The attacker's ability to escalate privileges by exploiting authentication weaknesses would likely be constrained, reducing the risk of unauthorized access.
Control: East-West Traffic Security
Mitigation: The attacker's ability to move laterally using WMI would likely be constrained, reducing the risk of unauthorized command execution on remote systems.
Control: Multicloud Visibility & Control
Mitigation: The attacker's ability to maintain command and control through legitimate cloud services would likely be constrained, reducing the risk of stealthy communication.
Control: Egress Security & Policy Enforcement
Mitigation: The attacker's ability to conduct selective data access and reconnaissance would likely be constrained, reducing the risk of data exfiltration.
The attacker's ability to maintain long-term espionage access would likely be constrained, reducing the risk of strategic intelligence collection.
Impact at a Glance
Affected Business Functions
- Software Update Mechanism
- User Trust and Security
- Software Distribution Integrity
Estimated downtime: N/A
Estimated loss: N/A
Potential exposure of sensitive user data due to malware delivered through compromised updates.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict lateral movement within networks.
- • Deploy East-West Traffic Security controls to monitor and control internal communications.
- • Utilize Multicloud Visibility & Control to detect and manage unauthorized use of cloud services.
- • Enforce Egress Security & Policy Enforcement to prevent unauthorized data exfiltration.
- • Regularly update and patch software to mitigate vulnerabilities exploited in supply chain attacks.

