top of page

Notepad++ Hosting Breach Tied to China's Lotus Blossom Hackers

  • Feb 3
  • 3 min read

Key Findings


  • The Notepad++ hosting infrastructure was compromised, allowing threat actors to hijack update traffic and deliver a previously undocumented backdoor codenamed Chrysalis

  • The attack has been attributed with medium confidence to the China-linked advanced persistent threat (APT) group known as Lotus Blossom (aka Billbug, Bronze Elgin, Lotus Panda, Raspberry Typhoon, Spring Dragon, and Thrip)

  • The compromise occurred at the hosting provider level, not due to vulnerabilities in Notepad++ itself

  • Attackers exploited insufficient update verification controls in older versions of Notepad++ to selectively redirect user update requests to malicious servers

  • The weakness was addressed in version 8.8.9 released in December 2025, and Notepad++ has since migrated to a new hosting provider with stronger security


Background


Notepad++ is a widely used open-source text editor, popular among IT administrators, developers, students, and security researchers. The software's hosting infrastructure was recently discovered to have been compromised, enabling threat actors to hijack update traffic and deliver a previously undocumented backdoor known as Chrysalis.


Lotus Blossom Attributed to the Attack


Rapid7's analysis has attributed the Notepad++ hosting breach with medium confidence to the China-linked advanced persistent threat (APT) group known as Lotus Blossom (aka Billbug, Bronze Elgin, Lotus Panda, Raspberry Typhoon, Spring Dragon, and Thrip). This attribution is based on similarities with the group's previous campaigns, including the use of legitimate executables for DLL side-loading and the integration of undocumented system calls for stealth and resilience.


Compromise Timeline and Remediation


The initial breach occurred in June 2025 and continued in various forms until at least November, with possible access lasting until December 2, 2025. The compromise was at the hosting provider level, exploiting insufficient update verification controls in older versions of Notepad++ to selectively redirect user update requests to malicious servers.


The weakness was addressed in version 8.8.9 released in December 2025, and Notepad++ has since migrated to a new hosting provider with stronger security measures, including the implementation of signed update responses and stricter enforcement of certificate validation.


Malware Analysis: Chrysalis Backdoor


The delivered malware, codenamed Chrysalis, is a feature-rich implant that gathers system information and contacts an external command-and-control (C2) server to receive additional commands. It is capable of processing incoming HTTP responses to spawn an interactive shell, create processes, perform file operations, upload/download files, and uninstall itself.


The threat actor has also been found to copy and modify an existing proof-of-concept (PoC) published by a German cybersecurity company to execute shellcode using Microsoft's undocumented Warbird framework for code protection and obfuscation.


Infection Chains and Targeted Victims


Kaspersky researchers observed three different infection chains targeting individuals in Vietnam, El Salvador, and Australia, a government organization in the Philippines, a financial organization in El Salvador, and an IT service provider in Vietnam. The attackers constantly rotated C2 server addresses, downloaders, and final payloads over the course of four months from July to October 2025.


Conclusion


The Notepad++ hosting breach highlights the ongoing risks associated with supply chain attacks, where trusted software distribution channels can be compromised to target users. The selective nature of the redirections and the patience and precision involved suggest the involvement of a state-sponsored advanced persistent threat group, in this case, the China-linked Lotus Blossom.


The incident serves as a stark reminder of the importance of maintaining strong security practices, including keeping systems up-to-date, monitoring for unusual behavior, and verifying the integrity of software updates, even for widely used and trusted applications.


Sources


  • https://thehackernews.com/2026/02/notepad-hosting-breach-attributed-to.html

  • https://hackread.com/notepad-updates-malware-hosting-breach/

  • https://securityaffairs.com/187570/apt/notepad-infrastructure-hack-likely-tied-to-china-nexus-apt-lotus-blossom.html

  • https://x.com/shah_sheikh/status/2018549771431014546

  • https://www.theregister.com/2026/02/02/notepad_hijacking_lotus_blossom/

  • https://www.facebook.com/thehackernews/posts/-china-linked-lotus-blossom-compromised-notepad-hosting-infrastructure-to-hijack/1284335237064390/

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page