Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Notepad++ Hosting Compromise Linked to Chinese Hackers

Notepad++ Hosting Compromise Linked to Chinese Hackers

Posted on February 3, 2026 By CWS

Key Points

  • Notepad++ hosting was compromised by the China-linked Lotus Blossom group.
  • A backdoor named Chrysalis was delivered to users.
  • The hosting breach was fixed with an update in December 2025.
  • Rapid7 linked the attack to previous campaigns by the same group.

Introduction to the Notepad++ Hosting Breach

The open-source text editor Notepad++ recently found its hosting infrastructure compromised by a hacking group linked to China, known as Lotus Blossom. This breach was identified after the attackers managed to deliver a backdoor called Chrysalis to the software’s users. The cybersecurity firm Rapid7 has provided new insights into this incident, highlighting the vulnerabilities exploited by the threat actors.

The breach occurred at the hosting provider level, allowing the attackers to redirect update requests to malicious servers. This operation took advantage of inadequate update verification controls present in older versions of Notepad++. The issue was addressed in December 2025 when a new version was released to patch the vulnerability.

Details of the Attack and Its Implications

According to Rapid7’s findings, the attackers gained access to Notepad++’s hosting infrastructure, redirecting traffic to deliver a compromised update. This update included a backdoor that enabled the attackers to gather system information and potentially execute further commands on affected systems. However, the security measures implemented after the breach have since mitigated these threats.

The attack mechanism involved several components, including a suspicious process named ‘update.exe’ downloaded from a specific IP address. This file is an installer containing multiple files, such as an installation script and a malicious DLL designed for side-loading.

  • An NSIS installation script
  • BluetoothService.exe for DLL side-loading
  • BluetoothService, encrypted shellcode
  • log.dll, a malicious DLL

Chrysalis Backdoor: Features and Analysis

The Chrysalis backdoor, a custom implant used in this attack, is capable of various operations. It connects to an external server and processes HTTP responses to execute commands, manage files, and potentially uninstall itself. Although the command-and-control server is currently offline, the backdoor’s design suggests it was actively developed over time.

Rapid7’s analysis also identified a component within Chrysalis intended to retrieve a Cobalt Strike beacon using a custom loader. This loader employs Microsoft’s Warbird framework for code protection, adding another layer of sophistication to the attack.

Conclusion and Future Outlook

The breach of Notepad++’s hosting infrastructure underscores the persistent threat posed by state-sponsored hacking groups like Lotus Blossom. Despite the vulnerabilities being patched, the incident highlights the need for continuous vigilance and robust security measures to protect open-source projects. Moving forward, maintaining updated software and employing rigorous security protocols will be critical in defending against such sophisticated attacks.

Frequently Asked Questions

  • What is Chrysalis?
    Chrysalis is a backdoor used by the Lotus Blossom group to gather system information and execute commands on infected systems.
  • How was the Notepad++ breach discovered?
    The breach was identified through analysis by Rapid7, which linked the attack to previous campaigns by Lotus Blossom.
  • What measures were taken to secure Notepad++?
    The vulnerability was patched with a new software version in December 2025, and the hosting provider was changed to enhance security.
  • Who is the Lotus Blossom group?
    Lotus Blossom is a hacking group linked to China, known for using sophisticated techniques in cyberattacks.
  • Is the Chrysalis backdoor still active?
    The command-and-control server for Chrysalis is currently offline, reducing its immediate threat.
The Hacker News Tags:C2 Server, China-linked Hackers, Chrysalis, Cybersecurity, DLL Sideloading, Hacking, Information Security, Lotus Blossom, Malware, Notepad, Open Source, Rapid7, security breach, Software Security, Threat Actors

Post navigation

Previous Post: Notepad++ Compromised by Chinese APT Group with Custom Malware
Next Post: Firefox Introduces Easy Control to Disable AI Features

Related Posts

Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT The Hacker News
Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems The Hacker News
North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews North Korean PurpleBravo Campaign Targeted 3,136 IP Addresses via Fake Job Interviews The Hacker News
Adds Device Fingerprinting, PNG Steganography Payloads Adds Device Fingerprinting, PNG Steganography Payloads The Hacker News
Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager Fortinet SSL VPNs Hit by Global Brute-Force Wave Before Attackers Shift to FortiManager The Hacker News
GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News