Chinese APT Lotus Blossom Exploits Notepad++ Supply Chain for Espionage
A sophisticated supply chain compromise was uncovered targeting Notepad++ , the widely adopted open-source text editor. The operation has been attributed to a Chinese state-linked APT known as Lotus Blossom (also tracked as Billbug ). This incident exemplifies the growing sophistication of nation-state cyber-espionage operations and demonstrates how trusted software infrastructure can be weaponized for long-term intelligence collection. Overview of the Attack Lotus Blossom gained unauthorized access to the Notepad++ update infrastructure, allowing them to distribute malicious updates to select organizations. These updates were digitally signed to appear legitimate and, once installed, embedded espionage backdoors capable of long-term persistence, exfiltrating sensitive files, and establishing continuous access without raising alarms. Scope and Targets The campaign was highly selective rather than indiscriminate. Analysis indicates that the attackers focused on: Stra...