BridgeLynk logo
BRIDGELYNK
Notepad++ Update Feature Hijacked by Chinese State Hackers for Months

Notepad++ Update Feature Hijacked by Chinese State Hackers for Months

Between June and December 2025, Chinese state-linked hackers from the Lotus Blossom group hijacked the Notepad++ update mechanism to deliver a custom backdoor to millions of users. Here is a full breakdown of what happened and what organisations must do now.

BridgeLynk Threat Intelligence
BridgeLynk Threat Intelligence
Mar 13, 2026

In this article

Overview

Software updates are a cornerstone of good security hygiene. But what happens when the update mechanism itself becomes the attack vector? Between June and December 2025, the infrastructure hosting the widely used text editor Notepad++ was compromised by Lotus Blossom — a long-running Chinese state espionage group. The attackers hijacked the software's update feature to silently deliver a sophisticated custom backdoor, named Chrysalis, to targeted users across government, telecommunications, aviation, critical infrastructure, and media sectors. The attack exploited a cryptographic verification gap in the WinGUp updater component and represents a significant supply chain compromise affecting tens of millions of potential users globally. CVE-2025-15556 has been assigned with a CVSS score of 7.7.

Vulnerability Summary

CVE: CVE-2025-15556 | CVSS Score: 7.7 (High) | CVSS v4: AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N | MITRE ATT&CK: TA0001 – Initial Access / T1195 – Supply Chain Compromise | Threat Actor: Lotus Blossom (China-linked APT) | Attribution Confidence: Medium Notepad++ is a free, open-source text and source code editor for Windows with an estimated user base in the tens of millions. Its WinGUp component (GUP.exe) is responsible for fetching and applying software updates — and it was the absence of cryptographic integrity verification in this component that allowed attackers to intercept and replace legitimate update packages with malicious ones.

How the Attack Unfolded

The attack chain began with Lotus Blossom compromising the hosting provider's infrastructure — not the Notepad++ source code itself. This distinction is important: no malicious code was inserted into Notepad++.exe. Instead, the attackers positioned themselves to intercept and redirect update traffic flowing to notepad-plus-plus.org, selectively serving tampered update packages to targeted users. When an affected user's Notepad++ instance checked for updates, the WinGUp updater (GUP.exe) retrieved a malicious installer — update.exe — from a threat-actor-controlled IP address (95.179.213.0). This installer, built using Nullsoft Scriptable Install System (NSIS), contained four components working together: an NSIS installation script to orchestrate execution; BluetoothService.exe, a renamed legitimate Bitdefender tool used as a carrier for DLL side-loading; an encrypted shellcode payload named BluetoothService (the Chrysalis implant); and log.dll, a malicious DLL that decrypts and executes the Chrysalis shellcode. DLL side-loading — the technique of using a legitimate, signed executable to load a malicious DLL — is a hallmark of Chinese APT tradecraft and helps evade detection by endpoint security tools that trust the signing certificate of the parent executable. Once deployed, Chrysalis gathers detailed system information and beacons to a command-and-control server at api.skycloudcenter[.]com (currently offline). Analysis by Rapid7 has confirmed the implant is capable of spawning interactive shells, creating and terminating processes, performing file operations including upload and download, and uninstalling itself to cover its tracks. A configuration file named conf.c was also identified, designed to retrieve a Cobalt Strike beacon via a custom loader — indicating the attackers intended to use Chrysalis as a foothold for deeper, long-term access.

Remediation and Fixes

Following confirmation of the breach in December 2025, the Notepad++ development team acted quickly. All update infrastructure was migrated to a new hosting provider with enhanced security controls, severing the attackers' ability to intercept further update traffic. Users are strongly advised to upgrade to Notepad++ v8.8.9 immediately. This version introduces XML signature validation (XMLDSig) for update packages, meaning tampered updates will be rejected before installation. Version 8.9.2 — currently in development — will enforce mandatory, non-optional certificate signature validation, further hardening the update channel against future abuse. Organisations should also treat this incident as a prompt to review their broader approach to third-party software update mechanisms, which are an increasingly favoured vector for supply chain attacks.

Broader Implications for Organisations

This attack illustrates a pattern that security teams must internalise: supply chain compromise does not require breaking into the software you trust — it requires breaking into the infrastructure that delivers it. Lotus Blossom did not touch a single line of Notepad++ source code. They simply stood between the update server and the user. Organisations should treat all software update mechanisms as high-risk supply chain components, not as trusted background processes. Specific actions to consider include: enforcing update integrity checks across all third-party tooling deployed in the environment; monitoring endpoint process chains for anomalous parent-child relationships, particularly where legitimate executables spawn unexpected child processes; incorporating third-party hosting providers and update infrastructure into organisational security risk assessments; and deploying endpoint detection and response (EDR) tooling capable of identifying DLL side-loading behaviour and suspicious shellcode execution patterns.

How BridgeLynk Can Help

Supply chain attacks are among the most difficult threats to detect and defend against because they exploit trust — in software vendors, update mechanisms, and the tools organisations rely on every day. BridgeLynk helps organisations understand their supply chain attack surface, build detection capabilities for advanced persistent threats like Lotus Blossom, and develop the security maturity needed to respond when trusted tools become vectors. Speak to our team or explore our attack-informed defence services to learn more.

Our Articles

Check out other related articles

Check out other related articles

Tool and strategies modern teams need to help their companies grow.

Tool and strategies modern teams need to help their companies grow.

View All Articles

Critical Remote Code Execution (RCE) in AI Automation Tool n8n — "Ni8mare"
Advisory

Critical Remote Code Execution (RCE) in AI Automation Tool n8n — "Ni8mare"

A critical unauthenticated RCE vulnerability (CVE-2026-21858, CVSS 10.0) in the popular AI workflow tool n8n allows attackers to read sensitive server files and escalate to full remote code execution. Here is what you need to know.

Mar 13, 2026
Read
Critical Remote Code Execution (RCE) in AI Automation Tool n8n — "Ni8mare"
Advisory

Critical Remote Code Execution (RCE) in AI Automation Tool n8n — "Ni8mare"

A critical unauthenticated RCE vulnerability (CVE-2026-21858, CVSS 10.0) in the popular AI workflow tool n8n allows attackers to read sensitive server files and escalate to full remote code execution. Here is what you need to know.

Mar 13, 2026
Read
Critical Authentication Bypass in Cisco Catalyst SD-WAN — CVE-2026-20127
Advisory

Critical Authentication Bypass in Cisco Catalyst SD-WAN — CVE-2026-20127

A maximum-severity vulnerability (CVSS 10.0) in Cisco Catalyst SD-WAN controllers is being actively exploited in the wild. Attackers are bypassing authentication, escalating to root, and establishing persistent access across enterprise network infrastructure.

Mar 13, 2026
Read
Critical Authentication Bypass in Cisco Catalyst SD-WAN — CVE-2026-20127
Advisory

Critical Authentication Bypass in Cisco Catalyst SD-WAN — CVE-2026-20127

A maximum-severity vulnerability (CVSS 10.0) in Cisco Catalyst SD-WAN controllers is being actively exploited in the wild. Attackers are bypassing authentication, escalating to root, and establishing persistent access across enterprise network infrastructure.

Mar 13, 2026
Read
Notepad++ Update Feature Hijacked by Chinese State Hackers for Months
Advisory

Notepad++ Update Feature Hijacked by Chinese State Hackers for Months

Between June and December 2025, Chinese state-linked hackers from the Lotus Blossom group hijacked the Notepad++ update mechanism to deliver a custom backdoor to millions of users. Here is a full breakdown of what happened and what organisations must do now.

Mar 13, 2026
Read
Notepad++ Update Feature Hijacked by Chinese State Hackers for Months
Advisory

Notepad++ Update Feature Hijacked by Chinese State Hackers for Months

Between June and December 2025, Chinese state-linked hackers from the Lotus Blossom group hijacked the Notepad++ update mechanism to deliver a custom backdoor to millions of users. Here is a full breakdown of what happened and what organisations must do now.

Mar 13, 2026
Read
Get Started Today

Ready to Build a Cyber Resilient Business?
Book a Free 60 Minute Threat Assessment Consultation