Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group

0
Medium
Vulnerabilityrce
Published: Tue Feb 03 2026 (02/03/2026, 04:55:00 UTC)
Source: The Hacker News

Description

A China-linked threat actor known as Lotus Blossom has been attributed with medium confidence to the recently discovered compromise of the infrastructure hosting Notepad++. The attack enabled the state-sponsored hacking group to deliver a previously undocumented backdoor codenamed Chrysalis to users of the open-source editor, according to new findings from Rapid7. The development comes shortly

AI-Powered Analysis

AILast updated: 02/03/2026, 04:59:30 UTC

Technical Analysis

The Lotus Blossom threat group, linked to China, conducted a targeted supply chain attack against Notepad++ by breaching its hosting provider infrastructure. This breach allowed the attackers to hijack update traffic from June 2025 until their access was terminated on December 2, 2025. By exploiting insufficient update verification mechanisms in older Notepad++ versions, the attackers selectively redirected update requests from certain users to malicious servers, delivering a backdoor implant named Chrysalis. Chrysalis is a complex, multi-layered malware implant that uses DLL side-loading techniques, specifically leveraging a renamed Bitdefender Submission Wizard executable (BluetoothService.exe) to sideload a malicious DLL (log.dll) that decrypts and executes encrypted shellcode. The implant gathers system information and communicates with a command-and-control server (api.skycloudcenter[.]com) to receive further commands, including spawning interactive shells, file operations, process creation, and self-removal. The malware also incorporates a custom loader embedding Metasploit block API shellcode and uses Microsoft Warbird, an undocumented obfuscation framework, to evade detection. Rapid7's analysis found no evidence of widespread exploitation via the update mechanism, but the attack demonstrates advanced tactics such as DLL sideloading, shellcode obfuscation, and rapid adaptation of public research tools. Notepad++ responded by migrating to a more secure hosting provider, rotating credentials, and releasing version 8.8.9 to fix the update verification flaw. The attack is consistent with Lotus Blossom's prior campaigns involving similar techniques and tools, indicating an evolution in their operational sophistication and stealth capabilities.

Potential Impact

For European organizations, the compromise of Notepad++'s update infrastructure poses a significant supply chain risk, especially for entities relying on this widely used open-source editor for software development, system administration, and general text editing. The delivery of the Chrysalis backdoor could lead to unauthorized system access, data exfiltration, lateral movement within networks, and potential disruption of operations. Given the implant's capabilities to execute arbitrary commands, upload/download files, and maintain persistence stealthily, affected systems could be fully compromised without immediate detection. The attack also undermines trust in open-source software supply chains, potentially impacting compliance and security postures. Although no widespread exploitation has been confirmed, targeted attacks could focus on high-value European sectors such as government, critical infrastructure, technology firms, and research institutions. The incident highlights the need for rigorous software supply chain security and monitoring for anomalous update behaviors. Additionally, the use of commodity frameworks like Metasploit and Cobalt Strike alongside custom malware increases the complexity of detection and response efforts.

Mitigation Recommendations

European organizations should immediately ensure that all Notepad++ installations are updated to version 8.8.9 or later, which includes patches for the update verification vulnerability. Implement strict network monitoring to detect anomalous outbound connections, especially to suspicious domains like api.skycloudcenter[.]com or IP ranges associated with the attack. Employ endpoint detection and response (EDR) solutions capable of identifying DLL sideloading, unusual process executions (e.g., unexpected 'update.exe' or 'BluetoothService.exe' processes), and shellcode injection techniques. Conduct thorough audits of software supply chain dependencies and enforce cryptographic verification of software updates using strong signature validation mechanisms. Organizations should consider restricting or sandboxing the execution of update processes for critical applications and implement application allowlisting to prevent unauthorized binaries from running. Rotate credentials and secrets related to software update infrastructure and hosting providers regularly. Engage in threat hunting exercises focused on indicators of compromise related to Lotus Blossom tactics, techniques, and procedures (TTPs), including the use of Microsoft Warbird obfuscation and Metasploit/Cobalt Strike payloads. Finally, enhance user awareness about supply chain risks and encourage reporting of suspicious software behaviors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/notepad-hosting-breach-attributed-to.html","fetched":true,"fetchedAt":"2026-02-03T04:59:15.912Z","wordCount":1165}

Threat ID: 698180a3f9fa50a62fa53d84

Added to database: 2/3/2026, 4:59:15 AM

Last enriched: 2/3/2026, 4:59:30 AM

Last updated: 3/20/2026, 9:44:45 AM

Views: 552

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses