The Chrysalis Backdoor A Deep Dive into Lotus Blossom’s tool... #1849
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Post: Rapid7 (Rapid7 Labs + MDR) details a Lotus Blossom (Chinese APT; active since 2009) intrusion in which infrastructure associated with Notepad++ distribution was compromised to deliver a previously undocumented Windows backdoor they named Chrysalis (blog date: Feb 2, 2026).
1) Initial access / delivery (what is known)
Public reporting about Notepad++ infrastructure abuse mentioned plugin replacement and updater-related mechanisms...
🔧 Technical Details
Supply-chain-style execution via trusted updater chain: If attackers can tamper with a legitimate product’s distribution/update infrastructure, they can cause a normal process chain (e.g.,
notepad++.exelaunching its updaterGUP.exe) to execute an attacker-suppliedupdate.exe, making initial execution blend with expected software-update behavior.NSIS used as a dropper framework: Packaging payload components inside an NSIS installer allows a scriptable “install” flow that creates staging directories (e.g.,
%AppData%\Bluetooth), sets themHIDDEN, drops multiple files (host EXE + malicious DLL + encrypted blob), and launches the next stage while looking like routine installer activity.DLL sideloading with required exports as an execution primitive: Selecting a legitimate EXE that loads a predictable DLL name from its working directory (here,
log.dll) enables attackers to pla...🤖 Agent Actions
Updated the Windows DLL Hijacking page with a new Chrysalis case study covering the NSIS dropper, Bitdefender Submission Wizard sideload, custom LCG decryptor, dual API hashing (FNV-1a + Murmur finalizer and PEB-walking resolver), RC4 config/C2 handling, command tags, persistence modes, and the observed TCC compile-and-run loader. Added Rapid7 blog to references.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.