Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group
A China-linked state-sponsored threat actor known as Lotus Blossom compromised the hosting infrastructure of the popular open-source text editor Notepad++ between June and December 2025. The attackers hijacked update traffic to selectively deliver a previously undocumented backdoor named Chrysalis to targeted users by exploiting insufficient update verification controls in older Notepad++ versions. Chrysalis is a sophisticated implant capable of system reconnaissance, command execution, file operations, and self-uninstallation, communicating with a now-offline command-and-control server. The attack leveraged DLL side-loading and custom shellcode loaders, integrating commodity tools like Metasploit and Cobalt Strike, demonstrating advanced and evolving tradecraft. Notepad++ has since migrated to a new hosting provider with stronger security and patched the update verification weakness in version 8. 8. 9 released in December 2025. Although no widespread exploitation has been confirmed, the targeted supply chain compromise poses significant risks to users relying on Notepad++ updates. The threat highlights the increasing sophistication of supply chain attacks by nation-state actors and the need for robust software update security.
AI Analysis
Technical Summary
The Lotus Blossom threat group, linked to China, conducted a targeted supply chain attack against Notepad++ by breaching its hosting provider infrastructure. This breach allowed the attackers to hijack update traffic from June 2025 until their access was terminated on December 2, 2025. By exploiting insufficient update verification mechanisms in older Notepad++ versions, the attackers selectively redirected update requests from certain users to malicious servers, delivering a backdoor implant named Chrysalis. Chrysalis is a complex, multi-layered malware implant that uses DLL side-loading techniques, specifically leveraging a renamed Bitdefender Submission Wizard executable (BluetoothService.exe) to sideload a malicious DLL (log.dll) that decrypts and executes encrypted shellcode. The implant gathers system information and communicates with a command-and-control server (api.skycloudcenter[.]com) to receive further commands, including spawning interactive shells, file operations, process creation, and self-removal. The malware also incorporates a custom loader embedding Metasploit block API shellcode and uses Microsoft Warbird, an undocumented obfuscation framework, to evade detection. Rapid7's analysis found no evidence of widespread exploitation via the update mechanism, but the attack demonstrates advanced tactics such as DLL sideloading, shellcode obfuscation, and rapid adaptation of public research tools. Notepad++ responded by migrating to a more secure hosting provider, rotating credentials, and releasing version 8.8.9 to fix the update verification flaw. The attack is consistent with Lotus Blossom's prior campaigns involving similar techniques and tools, indicating an evolution in their operational sophistication and stealth capabilities.
Potential Impact
For European organizations, the compromise of Notepad++'s update infrastructure poses a significant supply chain risk, especially for entities relying on this widely used open-source editor for software development, system administration, and general text editing. The delivery of the Chrysalis backdoor could lead to unauthorized system access, data exfiltration, lateral movement within networks, and potential disruption of operations. Given the implant's capabilities to execute arbitrary commands, upload/download files, and maintain persistence stealthily, affected systems could be fully compromised without immediate detection. The attack also undermines trust in open-source software supply chains, potentially impacting compliance and security postures. Although no widespread exploitation has been confirmed, targeted attacks could focus on high-value European sectors such as government, critical infrastructure, technology firms, and research institutions. The incident highlights the need for rigorous software supply chain security and monitoring for anomalous update behaviors. Additionally, the use of commodity frameworks like Metasploit and Cobalt Strike alongside custom malware increases the complexity of detection and response efforts.
Mitigation Recommendations
European organizations should immediately ensure that all Notepad++ installations are updated to version 8.8.9 or later, which includes patches for the update verification vulnerability. Implement strict network monitoring to detect anomalous outbound connections, especially to suspicious domains like api.skycloudcenter[.]com or IP ranges associated with the attack. Employ endpoint detection and response (EDR) solutions capable of identifying DLL sideloading, unusual process executions (e.g., unexpected 'update.exe' or 'BluetoothService.exe' processes), and shellcode injection techniques. Conduct thorough audits of software supply chain dependencies and enforce cryptographic verification of software updates using strong signature validation mechanisms. Organizations should consider restricting or sandboxing the execution of update processes for critical applications and implement application allowlisting to prevent unauthorized binaries from running. Rotate credentials and secrets related to software update infrastructure and hosting providers regularly. Engage in threat hunting exercises focused on indicators of compromise related to Lotus Blossom tactics, techniques, and procedures (TTPs), including the use of Microsoft Warbird obfuscation and Metasploit/Cobalt Strike payloads. Finally, enhance user awareness about supply chain risks and encourage reporting of suspicious software behaviors.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Poland, Sweden, Belgium
Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group
Description
A China-linked state-sponsored threat actor known as Lotus Blossom compromised the hosting infrastructure of the popular open-source text editor Notepad++ between June and December 2025. The attackers hijacked update traffic to selectively deliver a previously undocumented backdoor named Chrysalis to targeted users by exploiting insufficient update verification controls in older Notepad++ versions. Chrysalis is a sophisticated implant capable of system reconnaissance, command execution, file operations, and self-uninstallation, communicating with a now-offline command-and-control server. The attack leveraged DLL side-loading and custom shellcode loaders, integrating commodity tools like Metasploit and Cobalt Strike, demonstrating advanced and evolving tradecraft. Notepad++ has since migrated to a new hosting provider with stronger security and patched the update verification weakness in version 8. 8. 9 released in December 2025. Although no widespread exploitation has been confirmed, the targeted supply chain compromise poses significant risks to users relying on Notepad++ updates. The threat highlights the increasing sophistication of supply chain attacks by nation-state actors and the need for robust software update security.
AI-Powered Analysis
Technical Analysis
The Lotus Blossom threat group, linked to China, conducted a targeted supply chain attack against Notepad++ by breaching its hosting provider infrastructure. This breach allowed the attackers to hijack update traffic from June 2025 until their access was terminated on December 2, 2025. By exploiting insufficient update verification mechanisms in older Notepad++ versions, the attackers selectively redirected update requests from certain users to malicious servers, delivering a backdoor implant named Chrysalis. Chrysalis is a complex, multi-layered malware implant that uses DLL side-loading techniques, specifically leveraging a renamed Bitdefender Submission Wizard executable (BluetoothService.exe) to sideload a malicious DLL (log.dll) that decrypts and executes encrypted shellcode. The implant gathers system information and communicates with a command-and-control server (api.skycloudcenter[.]com) to receive further commands, including spawning interactive shells, file operations, process creation, and self-removal. The malware also incorporates a custom loader embedding Metasploit block API shellcode and uses Microsoft Warbird, an undocumented obfuscation framework, to evade detection. Rapid7's analysis found no evidence of widespread exploitation via the update mechanism, but the attack demonstrates advanced tactics such as DLL sideloading, shellcode obfuscation, and rapid adaptation of public research tools. Notepad++ responded by migrating to a more secure hosting provider, rotating credentials, and releasing version 8.8.9 to fix the update verification flaw. The attack is consistent with Lotus Blossom's prior campaigns involving similar techniques and tools, indicating an evolution in their operational sophistication and stealth capabilities.
Potential Impact
For European organizations, the compromise of Notepad++'s update infrastructure poses a significant supply chain risk, especially for entities relying on this widely used open-source editor for software development, system administration, and general text editing. The delivery of the Chrysalis backdoor could lead to unauthorized system access, data exfiltration, lateral movement within networks, and potential disruption of operations. Given the implant's capabilities to execute arbitrary commands, upload/download files, and maintain persistence stealthily, affected systems could be fully compromised without immediate detection. The attack also undermines trust in open-source software supply chains, potentially impacting compliance and security postures. Although no widespread exploitation has been confirmed, targeted attacks could focus on high-value European sectors such as government, critical infrastructure, technology firms, and research institutions. The incident highlights the need for rigorous software supply chain security and monitoring for anomalous update behaviors. Additionally, the use of commodity frameworks like Metasploit and Cobalt Strike alongside custom malware increases the complexity of detection and response efforts.
Mitigation Recommendations
European organizations should immediately ensure that all Notepad++ installations are updated to version 8.8.9 or later, which includes patches for the update verification vulnerability. Implement strict network monitoring to detect anomalous outbound connections, especially to suspicious domains like api.skycloudcenter[.]com or IP ranges associated with the attack. Employ endpoint detection and response (EDR) solutions capable of identifying DLL sideloading, unusual process executions (e.g., unexpected 'update.exe' or 'BluetoothService.exe' processes), and shellcode injection techniques. Conduct thorough audits of software supply chain dependencies and enforce cryptographic verification of software updates using strong signature validation mechanisms. Organizations should consider restricting or sandboxing the execution of update processes for critical applications and implement application allowlisting to prevent unauthorized binaries from running. Rotate credentials and secrets related to software update infrastructure and hosting providers regularly. Engage in threat hunting exercises focused on indicators of compromise related to Lotus Blossom tactics, techniques, and procedures (TTPs), including the use of Microsoft Warbird obfuscation and Metasploit/Cobalt Strike payloads. Finally, enhance user awareness about supply chain risks and encourage reporting of suspicious software behaviors.
Affected Countries
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/02/notepad-hosting-breach-attributed-to.html","fetched":true,"fetchedAt":"2026-02-03T04:59:15.912Z","wordCount":1165}
Threat ID: 698180a3f9fa50a62fa53d84
Added to database: 2/3/2026, 4:59:15 AM
Last enriched: 2/3/2026, 4:59:30 AM
Last updated: 2/3/2026, 8:19:15 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-34021: Unrestricted upload of file with dangerous type in ELECOM CO.,LTD. WRC-1167GST2
MediumCVE-2024-25579: OS command injection in ELECOM CO.,LTD. WRC-1167GS2-B
MediumCVE-2026-1592: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
MediumCVE-2026-1591: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
MediumCVE-2026-24935: CWE-295 Improper Certificate Validation in ASUSTOR ADM
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.