Notepad++ code editor with cybersecurity warning overlay

Notepad++ Hijacked: How Chinese Hackers Hid in Plain Sight for 6 Months

Chinese state-sponsored group Lotus Blossom compromised Notepad++ update servers from June to December 2025, deploying a sophisticated backdoor called Chrysalis to government and financial targets.

LORIS.PRO Feb 11, 2026 4 min read

Notepad++ was compromised by Chinese APT group Lotus Blossom for 6 months (June-December 2025). The attackers hijacked the update mechanism to deliver a new backdoor called Chrysalis to fewer than 24 highly selective targets—government organizations in the Philippines, financial institutions in El Salvador, and IT providers in Vietnam. The breach was disclosed February 2, 2026. Update to v8.9.1 immediately.

What Happened?

On February 2, 2026, Notepad++ developer Don Ho disclosed that the application's update infrastructure had been compromised by suspected Chinese state-sponsored hackers. The attackers didn't exploit a vulnerability in Notepad++ itself—they compromised the hosting provider's infrastructure, allowing them to selectively redirect update traffic to malicious servers.

Security researchers at Rapid7 attributed the attack with "medium confidence" to Lotus Blossom (also known as Billbug), a Chinese APT group active since 2009 that primarily targets government, telecom, aviation, and critical infrastructure in Southeast Asia.

6 Months Compromised
<24 Targets Selected
2009 Lotus Blossom Active Since

Attack Timeline

According to Kaspersky and Rapid7, the attack unfolded over several months:

Source
"The shellcode, once decrypted by log.dll, is a custom, feature-rich backdoor we've named 'Chrysalis'. Its wide array of capabilities indicates it is a sophisticated and permanent tool, not a simple throwaway utility."
Rapid7

The Chrysalis Backdoor

Chrysalis is a previously undocumented backdoor discovered during this investigation. It uses custom encryption, reflective loading, API hashing, and hides its configuration in an encrypted shellcode blob. Key capabilities include:

Who Was Targeted?

Despite Notepad++ having millions of users worldwide, this was a highly selective attack. Kaspersky identified targets including:

Researchers stressed this was not broad supply-chain poisoning—the attackers deliberately kept the operation "low-noise" to avoid detection while maintaining long-term persistence.

What You Should Do

Update to Notepad++ v8.9.1 immediately via manual download from the official website or GitHub. The development team has migrated to a new hosting provider and strengthened the WinGup updater to verify both certificate and installer signatures before execution.

FAQ

Was my Notepad++ infected?
Probably not. The attack targeted fewer than 24 machines—primarily government organizations, financial institutions, and IT providers in Vietnam, Philippines, El Salvador, and Australia. Update to v8.9.1 immediately to be safe.
Who is Lotus Blossom?
Lotus Blossom (aka Billbug) is a Chinese state-sponsored APT group active since 2009. They primarily target government, telecom, aviation, and media organizations in Southeast Asia for espionage purposes.
What is the Chrysalis backdoor?
Chrysalis is a previously undocumented backdoor discovered by Rapid7. It uses custom encryption and reflective loading for stealth, and can spawn reverse shells, transfer files, persist via registry, and self-remove to avoid detection.