Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Chinese Threat Group Infiltrates Notepad++ and Accesses User Data
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Chinese Threat Group Infiltrates Notepad++ and Accesses User Data

Highlights

  • Lotus Blossom accessed Notepad++ servers for targeted espionage activities.

  • No widespread user data theft was detected during the breach period.

  • Users must update Notepad++ to reduce potential security risks.

Samantha Reed
Last updated: 3 February, 2026 - 12:19 am 12:19 am
Samantha Reed 1 hour ago
Share
SHARE

Contents
How Did Lotus Blossom Gain Access to Notepad++?Was Data Stolen from All Notepad++ Users?What Steps Did Notepad++ Take After the Breach?

Notepad++, a widely recognized open-source code editor, became the latest target of a sophisticated cyber operation orchestrated by the China-linked threat actor known as Lotus Blossom. Over a span of six months, the attackers covertly accessed critical Notepad++ infrastructure, raising new questions about the security of popular developer tools. The incident, affecting a subset of targeted users rather than the broader user base, underscores persistent risks in software supply chain defense. As discussion grows within the tech and security communities, attention now turns to both the response strategies taken and the broader threats posed by such advanced persistent threat groups.

Similar incidents in recent years have brought scrutiny to supply chain vulnerabilities within open-source projects, where attackers have exploited software updates and internal systems to compromise trust and steal information. Unlike earlier cases with more widespread consequences, such as those involving SolarWinds or malicious npm packages, this campaign primarily involved targeted espionage against select users rather than mass exploitation. Past probes into Notepad++’s security have also focused mainly on plugin vulnerabilities or unsecured update channels, but this marks one of the first times the tool’s core infrastructure proved a vector for an APT intrusion.

How Did Lotus Blossom Gain Access to Notepad++?

The Lotus Blossom group, also known as Billbug, Thrip, and Raspberry Typhoon, leveraged weak authentication mechanisms in Notepad++’s updater client to penetrate the software’s internal server beginning in June 2025. According to analysis from Rapid7, the attackers used this access to install a custom backdoor, allowing them to conduct reconnaissance and selectively monitor certain users’ activities.

Was Data Stolen from All Notepad++ Users?

Investigators have stated that there is currently no indication of mass data exfiltration from the platform. Instead, the focus of the attack appeared limited to a specific group of users, aligning with previous tactics used by Lotus Blossom for intelligence gathering.

“We have no evidence of bulk data exfiltration,”

said Christiaan Beek, Rapid7’s senior director of threat intelligence and analytics. The compromised environment primarily facilitated targeted espionage, including system profiling and command execution, rather than data theft affecting the general Notepad++ community.

What Steps Did Notepad++ Take After the Breach?

Once the attack was identified, Notepad++’s maintainer, Don Ho, released a software update in December 2025 aimed at mitigating the authentication weaknesses that enabled the incident. The Notepad++ website and related infrastructure have since been moved to a new hosting provider with enhanced security controls. Ho confirmed that while the perpetrators maintained access to certain internal systems until December, further exploitation opportunities were minimized.

“The website, which attackers targeted to exploit insufficient update verification controls that existed in older versions of Notepad++, was moved to a new hosting provider with stronger security practices,”

he disclosed in an official statement.

Analysis of the Lotus Blossom campaign demonstrates how sophisticated actors continue to leverage niche software utilities as conduits for selective intelligence collection. This case shows the importance of continuous vigilance, not only for the operators of open-source platforms but also for their large and diverse user bases—which include developers, IT professionals, and organizations in sensitive industries. For users, the incident highlights the critical need to keep software up to date and to pay attention to unusual behaviors in tools that are often trusted without scrutiny. While the current campaign appears contained, advanced persistent threats often adapt, making ongoing attention to update verification and server authentication a necessary part of software lifecycle management. Additionally, stakeholders should consider implementing enhanced threat monitoring and multifactor authentication within their IT processes.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Tech Industry Faces New Demands to Build Secure Software

U.S. Authorities Target Piracy Sites as Italy Shuts Illegal IPTV Operations

Google Cuts Millions of Devices from Malicious Proxy Network

Secret Service Official Urges Stricter Controls on Domain Registration

North Korean Cyber Group Splits to Target Multiple Sectors

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Tesla Model Y Performance Delivers Distinctive Drive Experience
Next Article RobCo Expands in U.S. and Grows Robot-as-a-Service Model

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

RobCo Expands in U.S. and Grows Robot-as-a-Service Model
Robotics
Tesla Model Y Performance Delivers Distinctive Drive Experience
Electric Vehicle
NASA’s Perseverance Rover Relies on AI for Mars Route Planning
AI Robotics
Tesla Scales Up Dry-Electrode 4680 Battery Production
Electric Vehicle
Tesla Teases Optimus V3 Robot Launch in China, Shifts Production Focus
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?