A newly analyzed threat, Chrysalis, is a sophisticated backdoor attributed to the Chinese APT group Lotus Blossom. The malware employs advanced evasion techniques including heavy obfuscation, API hashing, dynamic DNS resolution, custom encryption and stealthy C2 communication disguised as legitimate traffic. Once active, Chrysalis enables extensive malicious actions such as system reconnaissance, data theft, command execution, file transfer, interactive shell access, process manipulation and even self‑removal. In several cases, infected systems also showed chained delivery of Metasploit and Cobalt Strike payloads, adding further stealth and code‑protection layers.
Attackers abused the Notepad++ software distribution infrastructure as part of a supply‑chain compromise, delivering malicious update files to unsuspecting users. The malware leveraged DLL sideloading, placing tampered DLLs next to renamed legitimate executables to gain execution and persistence. The root cause was insufficient validation of software updates, such as missing or incomplete code‑signing and integrity checks—weaknesses that enabled silent, long‑term compromise without triggering standard defenses.
This Chrysalis report is delivered through our Threat Briefing (TB) feature. Introduced in Progress Flowmon ADS 12.5 version, Threat Briefings combine:
The benefit is simple: You spend less time researching and more time responding effectively.
From the moment a Threat Briefing is published, automatic detection becomes available to identify Chrysalis‑related activity in real time.
In addition, you can run retrospective analysis using the Indicators of Compromise (IoCs) from the briefing against your historical telemetry data. This allows you to quickly determine whether your environment was exposed before the briefing existed.
Having evidence of historical exposure is especially valuable from a compliance and audit perspective: it provides a verifiable trail showing whether—and when—affected systems were impacted, helping organizations demonstrate due diligence, support incident‑reporting requirements and document their response posture clearly and transparently.
Would you like to try Threat Briefing feature in your environment? Request Free Trial.
Subscribe to get all the news, info and tutorials you need to build better business apps and sites