Article Details

Scrape Timestamp (UTC): 2026-02-02 23:24:38.416

Source: https://www.theregister.com/2026/02/02/notepad_hijacking_lotus_blossom/

Original Article Text

Click to Toggle View

Notepad++ hijacking blamed on Chinese Lotus Blossom crew behind Chrysalis backdoor. The crew targets telecoms, critical infrastructure - all the usual high-value orgs. Security researchers have attributed the Notepad++ update hijacking to a Chinese government-linked espionage crew called Lotus Blossom (aka Lotus Panda, Billbug), which abused weaknesses in the update infrastructure to gain a foothold in high-value targets by delivering a newly identified backdoor dubbed Chrysalis. Early Monday, the text editor's project author said a suspected Chinese state-sponsored group somehow compromised a shared hosting server and selectively redirected some update traffic to an attacker-controlled site where victims downloaded a poisoned version of what appeared to be a legit software update. Later on Monday, Rapid7's managed detection and response team attributed the attack "with moderate confidence" to the Chinese advanced persistent threat (APT) group they call Lotus Blossom.  This group typically conducts targeted cyber-espionage campaigns against organizations in Southeast Asia - and more recently Central America - with a focus on government, telecom, aviation, critical infrastructure, and media sectors. According to the threat hunters, the espionage crew used the hijacked Notepad++ update to deliver a previously unknown backdoor called Chrysalis. Notepad++ author Don Ho did not immediately respond to The Register's inquiries about Rapid7's attribution and malware analysis. We will update this story if we hear back. While it's still unclear exactly how the miscreants gained initial access to Notepad++'s distribution infrastructure, once inside they abused that access to deliver a trojanized update in the form of an NSIS installer, a packaging format commonly abused by Chinese APT groups to deliver initial payloads. The installer contained an executable file named "BluetoothService.exe," which is a renamed legitimate Bitdefender Submission Wizard abused for DLL sideloading - another favorite technique among Beijing-backed spies to deliver custom implants. It also included a file called "BluetoothService" that is actually an encrypted shellcode, and a malicious DLL sideloaded by BluetoothService.exe. The shellcode here is the Chrysalis backdoor, and according to Rapid7, "its wide array of capabilities indicates it is a sophisticated and permanent tool, not a simple throwaway utility." It uses legitimate binaries to sideload a malicious DLL with a generic name to make sure it's not discovered by simple filename-based detection tools. It also uses custom API hashing in both the loader and the main module, along with multiple layers of obfuscation to further cover its tracks, as well as "a fairly structured approach to C2 communication," the researchers wrote. As of press time, Rapid7 didn't have visibility into how many victims inadvertently downloaded the Chrysalis malware - but we will update this story if we learn more. The security sleuths did, however, publish a full list of file and network indicators of compromise, so be sure to give that a read. They note the attribution is primarily based on similarities between the initial loader use and previous research from Symantec, including the goon squad using a renamed Bitdefender Submission Wizard to sideload a file called "log.dll" for decrypting and executing an additional payload. "In addition, similarities of the execution chain of 'conf.c' retrieved from the infected asset and other loaders that we found, supported by the same public key extracted from [Cobalt Strike] beacons delivered through 'conf.c' and 'ConsoleApplication2.exe' suggest with moderate confidence that the threat actor behind this campaign is likely Lotus Blossom," the Rapid7 team wrote.

Daily Brief Summary

NATION STATE ACTIVITY // Chinese APT Group Hijacks Notepad++ Updates to Deploy Chrysalis Backdoor

Security researchers attribute a Notepad++ update hijacking to the Chinese espionage group Lotus Blossom, targeting high-value sectors such as telecoms and critical infrastructure.

The attackers exploited vulnerabilities in the update infrastructure, redirecting some update traffic to a malicious site where victims downloaded a compromised software update.

The hijacked update delivered a newly identified backdoor, Chrysalis, using a trojanized NSIS installer to deploy the malware via DLL sideloading techniques.

Chrysalis employs advanced techniques, including API hashing and multiple layers of obfuscation, to evade detection while maintaining persistent access to compromised systems.

Rapid7's analysis links the attack to Lotus Blossom with moderate confidence, based on similarities with past campaigns and the use of specific tools and tactics.

The incident highlights ongoing cyber-espionage threats from state-sponsored actors, emphasizing the importance of securing software distribution channels against such intrusions.

Rapid7 has released indicators of compromise to aid organizations in detecting and mitigating potential infections from this campaign.