Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

EU releases new cancer prevention guidelines on World Cancer Day

Microsoft warns that Python Infostears is targeting macOS via fake ads and installers

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Notepad++ hosting breach by China-linked Lotus Blossom hacking group
Identity

Notepad++ hosting breach by China-linked Lotus Blossom hacking group

userBy userFebruary 3, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 3, 2026Malware / Open Source

A recently discovered compromise of the infrastructure hosting Notepad++ is believed with medium confidence to be the work of a China-affiliated actor known as Lotus Blossom.

The attack allowed a state-sponsored hacker group to distribute a previously undocumented backdoor codenamed “Chrysalis” to users of the open-source editor, according to new findings from Rapid7.

This development comes shortly after Notepad++ administrator Don Ho said that a breach at the hosting provider level allowed attackers to hijack update traffic starting in June 2025 and exploit poor update validation controls that existed in older versions of the utility to selectively redirect requests from certain users to malicious servers and serve tampered updates.

cyber security

This vulnerability was resolved with the release of version 8.8.9 in December 2025. It was subsequently discovered that the software’s hosting provider had been compromised, allowing targeted traffic redirection to take place until the attacker’s access was terminated on December 2, 2025. Notepad++ has since moved to a new hosting provider with improved security and rotated all credentials.

Rapid7’s analysis of this incident found no evidence or artifacts to suggest that Updater-related mechanisms were exploited to distribute malware.

“The only behavior observed was the execution of ‘notepad++.exe’ followed by ‘GUP.exe’ prior to the execution of the suspicious process ‘update.exe’ downloaded from 95.179.213.0,” security researcher Ivan Feigl said.

“Update.exe” is a Nullsoft Scriptable Install System (NSIS) installer that contains multiple files.

NSIS installation script BluetoothService.exe, a renamed version of the Bitdefender Submission Wizard used for DLL sideloading (a technique widely used by Chinese hacker groups) BluetoothService, encrypted shellcode (aka Chrysalis) log.dll, a malicious DLL that is sideloaded to decrypt and execute the shellcode

Chrysalis is a custom-built, feature-rich implant that collects system information and connects to external servers (“api.skycloudcenter”).[.]com”) may receive additional commands to execute on the infected host.

The command and control (C2) server is currently offline. However, closer inspection of the obfuscated artifact reveals that it can process incoming HTTP responses to spawn an interactive shell, create processes, perform file operations, upload/download files, and uninstall itself.

“Overall, this sample appears to be one that has been actively developed over time,” Rapid7 said, adding that it also identified a file named “conf.c” that was designed to retrieve Cobalt Strike beacons by a custom loader that embedded Metasploit block API shellcode.

One such loader, ‘ConsoleApplication2.exe’, is notable for using Microsoft Warbird, an undocumented internal code protection and obfuscation framework, to execute shellcode. The attackers were found to have copied and modified an existing proof of concept (PoC) published by German cybersecurity company Cirosec in September 2024.

cyber security

Rapid7 attributed Chrysalis to Lotus Blossom (also known as Billbug, Bronze Elgin, Lotus Blossom, Raspberry Typhoon, Spring Dragon, and Thrip). This is based on similarities to previous campaigns conducted by this threat actor. This includes a campaign documented by Broadcom-owned Symantec in April 2025 that used legitimate Trend Micro and Bitdefender executables to sideload malicious DLLs.

“While the group continues to rely on proven techniques such as DLL sideloading and service persistence, its multi-layered shellcode loader and integration of an undocumented system call (NtQuerySystemInformation) signals a clear shift towards more resilient and stealth tradecraft,” the company said.

“What stands out is the combination of tools: deploying custom malware (Chrysalis) alongside commodity frameworks like Metasploit and Cobalt Strike, and quickly adapting public research (particularly the Microsoft Warbird exploit). This shows Billbug is actively updating its playbook to stay ahead of the latest detections.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFintech CEO and former Forbes 30 Under 30 indicted on fraud charges
Next Article Mozilla adds one-click option to disable generated AI features in Firefox
user
  • Website

Related Posts

Microsoft warns that Python Infostears is targeting macOS via fake ads and installers

February 4, 2026

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

February 4, 2026

Docker fixes critical Ask Gordon AI flaw that allows code execution via image metadata

February 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

EU releases new cancer prevention guidelines on World Cancer Day

Microsoft warns that Python Infostears is targeting macOS via fake ads and installers

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

Minneapolis tech community remains strong during ‘tense and difficult times’

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.