Lotus Blossom Hackers Breach Notepad++ Hosting Infrastructure


State-sponsored hackers from the Lotus Blossom group, linked to China, breached Notepad++’s official hosting infrastructure from June to December 2025. They targeted users in government agencies, telecoms, and critical sectors by redirecting update traffic to malicious servers.

The group first compromised the shared hosting provider. This access let them intercept and swap legitimate updates for malware. Victims focused on Southeast Asia saw the most hits, with spread to South America, the US, and Europe.

Notepad++ is a free, open-source code editor used by millions. Admins and engineers depend on it for quick edits on secure servers. Its lightweight design fits air-gapped systems where heavy tools fail.

Notepad++ lead developer Don Ho posted on the official site. He confirmed the hijack started in June 2025 and ended by December.

Palo Alto Networks Unit 42 released a full report. They detail the infrastructure compromise and payloads.

Attack Breakdown

Hackers exploited weak verification in old WinGUp updaters. Victims downloaded fake update.exe files, triggering two chains.

One path used Lua scripts and EnumWindowStationsW API for Cobalt Strike beacons. The other sideloaded DLLs via legitimate BluetoothService.exe to drop the Chrysalis backdoor.

Chrysalis hid with Microsoft Warbird obfuscation and API hashing. C2 servers at 45.76.155[.]202 and 45.77.31[.]210 handled commands from August to November.

StageTechniqueOutcome
AccessShared host breachTraffic hijack
DeliveryMalicious NSIS installerFake updates
Path 1Lua injectionCobalt Strike
Path 2DLL sideloading w/ log.dllChrysalis backdoor
EvasionWarbird, API hashStealth persistence

Targets Hit

  • Government and telecom in Southeast Asia.
  • Energy, finance, manufacturing globally.
  • Cloud hosting and software devs.
  • Limited to select users, not mass attack.

Beacons lit up seconds after downloads. Sessions ran for weeks, focused on recon.

Notepad++ Fixes

Version 8.9.1 adds certificate checks and signed XML responses. A new host with better security is live. Version 8.9.2 tightens verification further.

No ongoing activity reported. Update now and scan systems.

FAQ

What caused the Notepad++ breach?

Compromise of the shared host let attackers redirect updates.

Who is Lotus Blossom?

China-linked APT group targeting Asia-Pacific high-value sectors.

Which versions need updates?

All before 8.9.1, due to WinGUp flaws.

Were all users affected?

No, selective targeting of specific regions and sectors.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages