Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Notepad++ Hosting Compromise Linked to Chinese Hackers

Notepad++ Hosting Compromise Linked to Chinese Hackers

Posted on February 3, 2026 By CWS

Key Points

  • Notepad++ hosting was compromised by the China-linked Lotus Blossom group.
  • A backdoor named Chrysalis was delivered to users.
  • The hosting breach was fixed with an update in December 2025.
  • Rapid7 linked the attack to previous campaigns by the same group.

Introduction to the Notepad++ Hosting Breach

The open-source text editor Notepad++ recently found its hosting infrastructure compromised by a hacking group linked to China, known as Lotus Blossom. This breach was identified after the attackers managed to deliver a backdoor called Chrysalis to the software’s users. The cybersecurity firm Rapid7 has provided new insights into this incident, highlighting the vulnerabilities exploited by the threat actors.

The breach occurred at the hosting provider level, allowing the attackers to redirect update requests to malicious servers. This operation took advantage of inadequate update verification controls present in older versions of Notepad++. The issue was addressed in December 2025 when a new version was released to patch the vulnerability.

Details of the Attack and Its Implications

According to Rapid7’s findings, the attackers gained access to Notepad++’s hosting infrastructure, redirecting traffic to deliver a compromised update. This update included a backdoor that enabled the attackers to gather system information and potentially execute further commands on affected systems. However, the security measures implemented after the breach have since mitigated these threats.

The attack mechanism involved several components, including a suspicious process named ‘update.exe’ downloaded from a specific IP address. This file is an installer containing multiple files, such as an installation script and a malicious DLL designed for side-loading.

  • An NSIS installation script
  • BluetoothService.exe for DLL side-loading
  • BluetoothService, encrypted shellcode
  • log.dll, a malicious DLL

Chrysalis Backdoor: Features and Analysis

The Chrysalis backdoor, a custom implant used in this attack, is capable of various operations. It connects to an external server and processes HTTP responses to execute commands, manage files, and potentially uninstall itself. Although the command-and-control server is currently offline, the backdoor’s design suggests it was actively developed over time.

Rapid7’s analysis also identified a component within Chrysalis intended to retrieve a Cobalt Strike beacon using a custom loader. This loader employs Microsoft’s Warbird framework for code protection, adding another layer of sophistication to the attack.

Conclusion and Future Outlook

The breach of Notepad++’s hosting infrastructure underscores the persistent threat posed by state-sponsored hacking groups like Lotus Blossom. Despite the vulnerabilities being patched, the incident highlights the need for continuous vigilance and robust security measures to protect open-source projects. Moving forward, maintaining updated software and employing rigorous security protocols will be critical in defending against such sophisticated attacks.

Frequently Asked Questions

  • What is Chrysalis?
    Chrysalis is a backdoor used by the Lotus Blossom group to gather system information and execute commands on infected systems.
  • How was the Notepad++ breach discovered?
    The breach was identified through analysis by Rapid7, which linked the attack to previous campaigns by Lotus Blossom.
  • What measures were taken to secure Notepad++?
    The vulnerability was patched with a new software version in December 2025, and the hosting provider was changed to enhance security.
  • Who is the Lotus Blossom group?
    Lotus Blossom is a hacking group linked to China, known for using sophisticated techniques in cyberattacks.
  • Is the Chrysalis backdoor still active?
    The command-and-control server for Chrysalis is currently offline, reducing its immediate threat.
The Hacker News Tags:C2 Server, China-linked Hackers, Chrysalis, Cybersecurity, DLL Sideloading, Hacking, Information Security, Lotus Blossom, Malware, Notepad, Open Source, Rapid7, security breach, Software Security, Threat Actors

Post navigation

Previous Post: Notepad++ Compromised by Chinese APT Group with Custom Malware
Next Post: Firefox Introduces Easy Control to Disable AI Features

Related Posts

Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time The Hacker News
U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware The Hacker News
Microsoft Alerts on IRS Phishing Amid Tax Season Microsoft Alerts on IRS Phishing Amid Tax Season The Hacker News
Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise The Hacker News
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools The Hacker News
Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark