Notepad++ Security Breach: Inside the Lotus Blossom Hacking Group's Attack (2026)

China-Linked Hacking Group Breaches Notepad++ Hosting, Delivers Backdoor

A state-sponsored hacking group, linked to China, has been identified as the culprit behind a recent breach of the infrastructure hosting Notepad++, an open-source text editor. This group, known as Lotus Blossom, has been attributed with medium confidence for the compromise. According to new findings from Rapid7, the attack allowed the group to deliver a previously undocumented backdoor, codenamed Chrysalis, to users of the editor.

The breach occurred due to a compromise at the hosting provider level, which enabled threat actors to hijack update traffic starting in June 2025. This allowed them to selectively redirect update requests from certain users to malicious servers, serving tampered updates. The weakness was addressed in December 2025 with the release of version 8.8.9, which included stronger security measures. Notepad++ has since migrated to a new hosting provider and rotated all credentials.

Rapid7's analysis revealed that the updater-related mechanism was not exploited to distribute malware. The only confirmed behavior was the execution of 'notepad++.exe' and 'GUP.exe', followed by a suspicious process 'update.exe' downloaded from a specific IP address. 'Update.exe' is an NSIS installer containing multiple files, including an NSIS script, a renamed version of Bitdefender's Submission Wizard, encrypted shellcode, and a malicious DLL.

Chrysalis is a feature-rich implant that gathers system information and contacts an external server to receive additional commands. The command-and-control server is currently offline, but the artifact is capable of processing HTTP responses to perform various actions, such as spawning an interactive shell and uninstalling itself. Rapid7 identified a file named 'conf.c' designed to retrieve a Cobalt Strike beacon using a custom loader and Metasploit shellcode.

The group's use of proven techniques like DLL side-loading and service persistence, along with their multi-layered shellcode loader and integration of undocumented system calls, marks a shift towards more resilient and stealthy tradecraft. The mix of tools, including custom malware and public research, demonstrates the group's proactive approach to staying ahead of modern detection methods.

For more exclusive content, follow The Hacker News on Google News, Twitter, and LinkedIn.

Notepad++ Security Breach: Inside the Lotus Blossom Hacking Group's Attack (2026)

References

Top Articles
Latest Posts
Recommended Articles
Article information

Author: Golda Nolan II

Last Updated:

Views: 6285

Rating: 4.8 / 5 (58 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Golda Nolan II

Birthday: 1998-05-14

Address: Suite 369 9754 Roberts Pines, West Benitaburgh, NM 69180-7958

Phone: +522993866487

Job: Sales Executive

Hobby: Worldbuilding, Shopping, Quilting, Cooking, Homebrewing, Leather crafting, Pet

Introduction: My name is Golda Nolan II, I am a thoughtful, clever, cute, jolly, brave, powerful, splendid person who loves writing and wants to share my knowledge and understanding with you.