Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Notepad++ Hosting Compromise Linked to Chinese Hackers

Notepad++ Hosting Compromise Linked to Chinese Hackers

Posted on February 3, 2026 By CWS

Key Points

  • Notepad++ hosting was compromised by the China-linked Lotus Blossom group.
  • A backdoor named Chrysalis was delivered to users.
  • The hosting breach was fixed with an update in December 2025.
  • Rapid7 linked the attack to previous campaigns by the same group.

Introduction to the Notepad++ Hosting Breach

The open-source text editor Notepad++ recently found its hosting infrastructure compromised by a hacking group linked to China, known as Lotus Blossom. This breach was identified after the attackers managed to deliver a backdoor called Chrysalis to the software’s users. The cybersecurity firm Rapid7 has provided new insights into this incident, highlighting the vulnerabilities exploited by the threat actors.

The breach occurred at the hosting provider level, allowing the attackers to redirect update requests to malicious servers. This operation took advantage of inadequate update verification controls present in older versions of Notepad++. The issue was addressed in December 2025 when a new version was released to patch the vulnerability.

Details of the Attack and Its Implications

According to Rapid7’s findings, the attackers gained access to Notepad++’s hosting infrastructure, redirecting traffic to deliver a compromised update. This update included a backdoor that enabled the attackers to gather system information and potentially execute further commands on affected systems. However, the security measures implemented after the breach have since mitigated these threats.

The attack mechanism involved several components, including a suspicious process named ‘update.exe’ downloaded from a specific IP address. This file is an installer containing multiple files, such as an installation script and a malicious DLL designed for side-loading.

  • An NSIS installation script
  • BluetoothService.exe for DLL side-loading
  • BluetoothService, encrypted shellcode
  • log.dll, a malicious DLL

Chrysalis Backdoor: Features and Analysis

The Chrysalis backdoor, a custom implant used in this attack, is capable of various operations. It connects to an external server and processes HTTP responses to execute commands, manage files, and potentially uninstall itself. Although the command-and-control server is currently offline, the backdoor’s design suggests it was actively developed over time.

Rapid7’s analysis also identified a component within Chrysalis intended to retrieve a Cobalt Strike beacon using a custom loader. This loader employs Microsoft’s Warbird framework for code protection, adding another layer of sophistication to the attack.

Conclusion and Future Outlook

The breach of Notepad++’s hosting infrastructure underscores the persistent threat posed by state-sponsored hacking groups like Lotus Blossom. Despite the vulnerabilities being patched, the incident highlights the need for continuous vigilance and robust security measures to protect open-source projects. Moving forward, maintaining updated software and employing rigorous security protocols will be critical in defending against such sophisticated attacks.

Frequently Asked Questions

  • What is Chrysalis?
    Chrysalis is a backdoor used by the Lotus Blossom group to gather system information and execute commands on infected systems.
  • How was the Notepad++ breach discovered?
    The breach was identified through analysis by Rapid7, which linked the attack to previous campaigns by Lotus Blossom.
  • What measures were taken to secure Notepad++?
    The vulnerability was patched with a new software version in December 2025, and the hosting provider was changed to enhance security.
  • Who is the Lotus Blossom group?
    Lotus Blossom is a hacking group linked to China, known for using sophisticated techniques in cyberattacks.
  • Is the Chrysalis backdoor still active?
    The command-and-control server for Chrysalis is currently offline, reducing its immediate threat.
The Hacker News Tags:C2 Server, China-linked Hackers, Chrysalis, Cybersecurity, DLL Sideloading, Hacking, Information Security, Lotus Blossom, Malware, Notepad, Open Source, Rapid7, security breach, Software Security, Threat Actors

Post navigation

Previous Post: Notepad++ Compromised by Chinese APT Group with Custom Malware
Next Post: Firefox Introduces Easy Control to Disable AI Features

Related Posts

SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw The Hacker News
USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More USB Malware, React2Shell, WhatsApp Worms, AI IDE Bugs & More The Hacker News
HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands The Hacker News
Why the New AI Browsers War is a Nightmare for Security Teams Why the New AI Browsers War is a Nightmare for Security Teams The Hacker News
CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw The Hacker News
27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Target React Server Components for Cyber Attacks
  • Microsoft’s Plan to Phase Out NTLM for Enhanced Security
  • Growing Infostealer Threat Targets macOS Using Python
  • GlassWorm Exploits VSX Extensions to Target Developers
  • Advanced PDFly Malware Variant Utilizes Custom Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Target React Server Components for Cyber Attacks
  • Microsoft’s Plan to Phase Out NTLM for Enhanced Security
  • Growing Infostealer Threat Targets macOS Using Python
  • GlassWorm Exploits VSX Extensions to Target Developers
  • Advanced PDFly Malware Variant Utilizes Custom Encryption

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark