{"id":23827,"date":"2026-03-10T08:30:46","date_gmt":"2026-03-10T01:30:46","guid":{"rendered":"https:\/\/fpt-is.com\/en\/?post_type=goc_nhin_so&#038;p=23827"},"modified":"2026-03-17T11:03:36","modified_gmt":"2026-03-17T04:03:36","slug":"the-notepad-supply-chain-attack-when-a-benign-tool-becomes-a-weapon-for-chinese-state-espionage","status":"publish","type":"goc_nhin_so","link":"https:\/\/fpt-is.com\/en\/insights\/the-notepad-supply-chain-attack-when-a-benign-tool-becomes-a-weapon-for-chinese-state-espionage\/","title":{"rendered":"The Notepad++ supply chain attack: When a benign tool becomes a weapon for Chinese state espionage"},"content":{"rendered":"<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">One of the software supply chain attacks discovered at the end of 2025 has further reinforced a troubling reality of modern cybersecurity: even the most benign applications can become entry points for nation-state actors. In December 2025, Rapid7 Labs discovered and publicly disclosed an attack campaign believed to be carried out by the APT group Lotus Blossom (Billbug) &#8211; a Chinese state-sponsored espionage group. The attackers exploited vulnerabilities in Notepad++\u2019s hosting infrastructure to distribute a new backdoor called Chrysalis to carefully selected targets.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Lotus Blossom profile: Asia\u2019s persistent cyber spy<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Lotus Blossom, also known by several other names such as Billbug (Symantec), Spring Dragon (Kaspersky), Thrip, Lotus Panda, and Bronze Elgin, is a Chinese APT group with a history of attacks spanning more than a decade. The group was first publicly identified in 2015 by Palo Alto Networks when it released a report on \u201cOperation Lotus Blossom\u201d, linking the group to more than 50 attacks over the preceding three years. Since then, Lotus Blossom has become one of Asia\u2019s most persistent cyber-espionage actors.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The group primarily operates in Southeast Asia, including Vietnam, the Philippines, Thailand, Cambodia, Malaysia, Indonesia, Hong Kong, and Taiwan. Its targets typically include government agencies, military organizations, telecommunications companies, aviation and transportation sectors, media organizations, and critical infrastructure &#8211; sectors closely tied to China\u2019s strategic interests, particularly regarding the South China Sea. The group\u2019s attack techniques have evolved from early basic phishing campaigns to more sophisticated methods, including exploiting public applications and leveraging legitimate cloud services as C2 (Command &amp; Control) servers.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Timeline of the attack: From initial access to discovery<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The Notepad++ attack began in June 2025, when Lotus Blossom, or actors working on their behalf, secretly infiltrated the shared hosting infrastructure used by Notepad++. It is important to note that the attackers did not exploit any vulnerabilities in the Notepad++ source code itself. Instead, they compromised the hosting provider layer, the physical servers that store update files.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Over the six months from June to December 2025, the attackers used the compromised access to intercept and redirect update traffic from selected Notepad++ users. When Windows users ran the Notepad++ application and triggered the WinGUp updater (the automatic update utility), instead of receiving a legitimate update from notepad-plus-plus.org, some users were redirected to attacker-controlled servers to download update.exe, an NSIS (Nullsoft Scriptable Install System) installer containing malicious code.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Although the hosting infrastructure was restored in September 2025 after the provider applied kernel and firmware updates, the attackers maintained access through stolen internal service credentials. As a result, they continued redirecting Notepad++ traffic until December 2, 2025, when the final access was terminated.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Chrysalis backdoor: The core tool of the campaign<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The main payload delivered through this access vector was a new backdoor named \u201cChrysalis\u201d by Rapid7 &#8211; an appropriate name given the attackers\u2019 intent to create persistent access channels that could survive long periods of time. Chrysalis is not a temporary tool; rather, it clearly represents a carefully developed, full-featured backdoor.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Chrysalis contains a wide range of powerful command-and-control capabilities, indicating it was designed for long-term use:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Interactive reverse shell: The backdoor can spawn a full cmd.exe shell, allowing attackers to execute any Windows command on the victim machine<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">File management: Remote reading, writing, deleting, and listing of files, as well as uploading and downloading data<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Information gathering: Querying system information, disk lists, antivirus installations, and system time<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Process execution: Creating new processes from C2 commands<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Self-deletion: A built-in mechanism to remove traces and artifacts<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">What makes Chrysalis technically notable is its heavy level of obfuscation. The backdoor uses custom API hashing, dynamic string obfuscation, and layered decryption to evade signature-based detection methods. Each decryption layer uses different algorithms &#8211; ranging from simple XOR operations to RC4 cryptography.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Attack techniques: A sophisticated blend of DLL sideloading and obfuscation<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The attack chain used to deliver Chrysalis to victim systems is highly sophisticated. After a user downloads the redirected update.exe file, the installer behaves like a typical NSIS setup program but executes several hidden steps.<\/span><\/p>\n<h3><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Step 1: DLL sideloading via bitdefender submission wizard<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The installer extracts and executes BluetoothService.exe, a renamed version of the Bitdefender Submission Wizard &#8211; a legitimate application from the well-known security vendor Bitdefender. This technique is known as DLL sideloading, a method widely used by APT groups to bypass security controls. When BluetoothService.exe runs, it searches for a dynamic link library called log.dll. Instead of loading the legitimate library, Windows loads a malicious log.dll placed in the same directory, thereby executing malicious code within the context of a trusted process.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">DLL sideloading works because it exploits the way Windows searches for DLL files. When an application requests a DLL, Windows checks specific locations in order, starting with the application\u2019s directory. By placing a malicious DLL with the same name in that directory, attackers ensure Windows loads the malicious version first. This technique is especially effective for APT groups because it bypasses detection based on file names and because many antivirus tools focus primarily on executable (.exe) files rather than DLLs.<\/span><\/p>\n<h3><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Step 2: Decryption of the intermediate shellcode<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The malicious log.dll contains two exported functions: LogInit and LogWrite. LogInit loads an encrypted file called BluetoothService (not an .exe file), while LogWrite implements a custom decryption routine. This mechanism uses a Linear Congruential Generator (LCG) with standard constants (0x19660D and 0x3C6EF35F) combined with simple data transformation steps. Once decrypted, the shellcode is executed.<\/span><\/p>\n<h3><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Step 3: Decrypting the main backdoor and dynamic API hashing<\/b><\/span><\/h3>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The decrypted shellcode then performs another decryption stage using a hardcoded key (gQ2JR&amp;9;) to generate the primary PE module &#8211; the actual Chrysalis backdoor. This module implements dynamic API hashing, allowing it to resolve Windows functions without directly calling GetProcAddress. Instead, the backdoor calculates hash values of API names and compares them with hardcoded values using hashing algorithms such as FNV-1a combined with MurmurHash-style mixing. This approach makes static analysis significantly more difficult.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Loader variants and the use of cobalt strike<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Another interesting aspect of the campaign is the integration of open-source tools. Alongside the custom Chrysalis backdoor, Rapid7 identified four different loader variants used to deploy Cobalt Strike beacons &#8211; a popular penetration-testing framework commonly repurposed by attackers to maintain access and move within networks.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Cobalt Strike Beacon enables attackers to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Execute commands on compromised systems<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Collect sensitive information<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Perform lateral movement across networks<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Deploy additional payloads<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The combination of a custom Chrysalis backdoor with Metasploit block_api shellcode and Cobalt Strike beacons shows an attack group flexibly exploiting both custom and readily available commodity tools.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">One particularly important loader was \u201cConsoleApplication2.exe,\u201d which Rapid7 discovered uses Microsoft Warbird &#8211; a sophisticated code protection framework used by Microsoft to protect its proprietary code. The attackers abused Warbird to hide shellcode execution by calling the undocumented system call NtQuerySystemInformation with the SystemCodeFlowTransition parameter. This suggests the group updated their tactics based on publicly available research, such as the DownWithUp article on Warbird abuse.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>C2 infrastructure masquerading as deepseek<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Chrysalis communicates with its command-and-control server using a hardcoded URL:<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/api.skycloudcenter.com\/a\/chat\/s\/70521ddf-a2ef-4adf-9cf0-6d8e24aaa821\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">https:\/\/api.skycloudcenter.com\/a\/chat\/s\/70521ddf-a2ef-4adf-9cf0-6d8e24aaa821<\/span><\/a><\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The URL structure \/a\/chat\/s\/{GUID} closely resembles the format used by Deepseek AI &#8211; a popular Chinese AI chatbot service, for its API endpoints. Rapid7 noted that this \u201cappears to simulate legitimate traffic in order to stay under the radar.\u201d This technique is often described as domain fronting or traffic masquerading, where malicious communications imitate legitimate service traffic to evade monitoring systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The IP address resolved from api.skycloudcenter.com was 61.4.102.97, located in Malaysia. At the time Rapid7 published its report, there was no evidence of other files communicating with that IP or URL.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Advanced loader behavior: Warbird implementation<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">One of Rapid7\u2019s most significant discoveries was the identification of \u201cConsoleApplication2.exe,\u201d a loader utilizing Warbird &#8211; an undocumented Microsoft code protection framework. Warbird was originally designed to protect proprietary Microsoft code, but APT groups have discovered ways to abuse it to conceal shellcode execution.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The loader achieves this by:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Loading the legitimate Windows system DLL clipc.dll<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Overwriting the first 0x490 bytes of clipc.dll memory with specially crafted data<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Changing the memory protection to PAGE_EXECUTE_READ<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Calling NtQuerySystemInformation with the parameter SystemCodeFlowTransition (Warbird WbHeapExecuteCall)<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">This technique allows shellcode to execute within the context of a legitimate Windows process, helping evade behavioral monitoring tools.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Targets and victims<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Unlike other large-scale supply chain attacks (such as the SolarWinds SUNBURST attack in 2020), the Notepad++ incident was highly targeted. Only a small number of users were redirected to malicious servers. Rapid7 did not disclose the exact number of victims, but reports indicate that the affected population was \u201csmall.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Forensic evidence suggests that primary targets included government agencies, telecommunications companies, aviation and transportation sectors, critical infrastructure organizations, and media outlets, mainly in Southeast Asia and Central America. This targeting pattern aligns closely with Lotus Blossom\u2019s historical operations focused on high-value strategic organizations.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Response and mitigation<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Notepad++ responded quickly to address the issue.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Release v8.8.9 (December 2025)<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Notepad++ released version 8.8.9, a vulnerability-fix update containing several key security improvements:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Implementation of signature and certificate verification for downloaded update files<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">If verification fails, the update process is automatically canceled<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Since version v8.8.7, Notepad++ binaries (including installers) have been digitally signed using a GlobalSign certificate<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Hosting migration<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Don Ho, the developer of Notepad++, stated that the official website had been moved to a new hosting provider with significantly stronger security policies to prevent similar incidents in the future.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">However, Rapid7 warned that users who previously installed the Notepad++ root certificate since version v8.8.7 should remove it, as it is no longer necessary.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>The broader rise of supply chain attacks<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The Notepad++ incident is not an isolated case. According to data from Cyble, software supply chain attacks have doubled since April 2025, averaging 26 attacks per month compared to 13 attacks per month between early 2024 and March 2025. October 2025 recorded the highest number of incidents, with 41 attacks reported &#8211; a 30% increase compared to the previous peak in April.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Industries most heavily impacted include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Energy and utilities<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Healthcare<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Manufacturing<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Technology<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Financial services<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">These attacks involve not only supply chain compromises but also zero-day exploits, ransomware operations, and intellectual property theft.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Why Notepad++?<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">A natural question arises: why target Notepad++?<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The answer lies in its popularity and trust level. Notepad++ is a widely used open-source code editor relied upon by developers, system administrators, and cybersecurity professionals around the world. Anything downloaded through its official updater is generally assumed to be trustworthy. This makes the Notepad++ infrastructure an attractive target for APT groups:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">High trust: Users trust updates from Notepad++<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Diverse user base: Widely used by IT professionals, developers, and security specialists<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Low suspicion: Users installing an \u201cupdate\u201d are unlikely to question its legitimacy<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Strategic impact: If attackers know that employees in a specific government agency widely use Notepad++, they can potentially infiltrate the entire organization through a single compromised update<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Attack techniques (TTPs)<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Rapid7 identified multiple MITRE ATT&amp;CK techniques used by Lotus Blossom in this campaign:<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><span style=\"font-weight: 400\">T1204.002 &#8211; User Execution: Malicious File<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">T1036 &#8211; Masquerading<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">T1027 &#8211; Obfuscated Files or Information<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">T1027.007 &#8211; Dynamic API Resolution<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">T1140 &#8211; Deobfuscate\/Decode Files or Information<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">T1574.002 &#8211; DLL Side-Loading<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">T1055 &#8211; Process Injection<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">T1620 &#8211; Reflective Code Loading<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">T1059.003 &#8211; Command and Scripting Interpreter: Windows Command Shell<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">T1083 &#8211; File and Directory Discovery<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">T1105 &#8211; Ingress Tool Transfer<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">T1041 &#8211; Exfiltration Over C2 Channel<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">T1573 &#8211; Encrypted Channel<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">T1547.001 &#8211; Boot or Logon Autostart Execution: Registry Run Keys (persistence)<\/span><\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Conclusion: A new stage in APT campaigns<\/b><\/span><\/h2>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The Notepad++ attack documented by Rapid7 is more than a typical software supply chain compromise. It represents an evolution in the tactics of Lotus Blossom. While the group has long been known to rely on proven techniques such as DLL sideloading and service-based persistence, the use of a custom multi-layered backdoor, advanced shellcode loaders, and the integration of public offensive tools indicates active adaptation to increasingly sophisticated defensive environments.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Rapid7 concluded: \u201cThe discovery of the Chrysalis backdoor and the Warbird loader highlights the evolution of Billbug\u2019s capabilities. While the group continues to rely on proven techniques such as DLL sideloading and service persistence, their multi-layered shellcode loaders and use of undocumented system calls demonstrate a clear shift toward stealthier and more cautious tactics.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">Notably, more than a year passed between the start of the attack (June 2025) and its public disclosure (February 2026). During that time, the campaign remained hidden and was only uncovered through proactive threat hunting by security researchers. This demonstrates the sophistication of the malware and its ability to evade detection systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">For cybersecurity professionals, system administrators, and government organizations, particularly in Southeast Asia, the Notepad++ incident serves as a critical warning. Even seemingly harmless software can be exploited to distribute malware if hosting infrastructure is not properly secured. It highlights the importance of verifying software updates, continuously monitoring supply chain risks, implementing behavior-based detection for anomalies such as DLL sideloading and unusual C2 communication, and maintaining updated indicators of compromise (IoCs) and rapid response strategies.<\/span><\/p>\n<p><span style=\"font-weight: 400;font-family: arial, helvetica, sans-serif;font-size: 12pt\">The Lotus Blossom Notepad++ campaign ultimately demonstrates that Chinese state-linked threat actors are operating at an increasingly advanced tactical level, and continued vigilance is essential.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>References<\/b><\/span><\/h2>\n<ol>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/ctrl.co\/security-advisory\/targeted-supply%E2%80%91chain-attacks-abuse-notepad-update-infrastructure-to-deliver-lotus-blossom-malware\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">Targeted Supply\u2011Chain Attacks Abuse Notepad++ Update Infrastructure to Deliver Lotus Blossom Malware<\/span><\/a><\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/notepad-update-hijacked\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">Notepad++ Update Hijacking Linked to Hosting Provider Compromise<\/span><\/a><\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/thehackernews.com\/2026\/02\/notepad-official-update-mechanism.html\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users<\/span><\/a><\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/apt.etda.or.th\/cgi-bin\/showcard.cgi?g=Lotus+Blossom%2C+Spring+Dragon%2C+Thrip&amp;n=1\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">APT group: Lotus Blossom, Spring Dragon, Thrip<\/span><\/a><\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/industrialcyber.co\/ransomware\/cisco-talos-exposes-lotus-blossom-cyber-espionage-campaigns-targeting-governments-telecom-media\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">Cisco Talos exposes Lotus Blossom cyber espionage campaigns targeting governments, telecom, media<\/span><\/a><\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/blog.talosintelligence.com\/lotus-blossom-espionage-group\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools<\/span><\/a><\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/industrialcyber.co\/ransomware\/billbug-espionage-group-targets-government-critical-sectors-in-coordinated-southeast-asia-cyber-intrusion-campaign\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">Billbug espionage group targets government, critical sectors in coordinated Southeast Asia cyber intrusion campaign<\/span><\/a><\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/www.rapid7.com\/blog\/post\/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">The Chrysalis Backdoor: A Deep Dive into Lotus Blossom\u2019s toolkit<\/span><\/a><\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/notepad-plus-plus.org\/news\/v889-released\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">Notepad++ v8.8.9 release: Vulnerability-fix<\/span><\/a><\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/cyble.com\/blog\/supply-chain-attacks-double-in-2025\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400\">Supply Chain Attacks Have Doubled. What\u2019s Driving the Increase?<\/span><\/a><\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<table style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Exclusive article by an expert from FPT IS, FPT Corporation<\/b><\/span><\/p>\n<p><em><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><b>Dinh Van Manh &#8211; FPT Information Security Center<\/b><\/span><\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n","protected":false},"author":21,"featured_media":0,"parent":0,"template":"","nang_luc":[821],"danh_muc_goc_nhin_so":[],"dich_vu":[],"linh_vuc":[],"platform":[],"san_pham":[],"the_goc_nhin_so":[],"class_list":["post-23827","goc_nhin_so","type-goc_nhin_so","status-publish","hentry","nang_luc-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/goc_nhin_so\/23827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/goc_nhin_so"}],"about":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/types\/goc_nhin_so"}],"author":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/users\/21"}],"wp:attachment":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media?parent=23827"}],"wp:term":[{"taxonomy":"nang_luc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/nang_luc?post=23827"},{"taxonomy":"danh_muc_goc_nhin_so","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/danh_muc_goc_nhin_so?post=23827"},{"taxonomy":"dich_vu","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/dich_vu?post=23827"},{"taxonomy":"linh_vuc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/linh_vuc?post=23827"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/platform?post=23827"},{"taxonomy":"san_pham","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/san_pham?post=23827"},{"taxonomy":"the_goc_nhin_so","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/the_goc_nhin_so?post=23827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}