Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Tropic Trooper Utilizes Trojanized Software for Cyber Attacks

Tropic Trooper Utilizes Trojanized Software for Cyber Attacks

Posted on April 24, 2026 By CWS

A recent cybersecurity study has revealed a sophisticated attack campaign targeting Chinese-speaking populations. The campaign, discovered by Zscaler ThreatLabz, involves a compromised version of the SumatraPDF reader that deploys the AdaptixC2 Beacon post-exploitation agent. This operation is linked to the notorious hacking group, Tropic Trooper, also known as APT23, Earth Centaur, KeyBoy, and Pirate Panda, with a history of targeting Taiwan, Hong Kong, and the Philippines since 2011.

Exploiting Software to Gain Access

The intrusion begins with a ZIP archive containing military-themed documents, which are designed to bait victims into launching the tampered SumatraPDF application. Once initiated, this altered software runs a decoy PDF file while simultaneously downloading encrypted shellcode from a staging server. This shellcode is crucial for launching AdaptixC2 Beacon, a tool that facilitates further malicious activities.

The backdoored SumatraPDF operates alongside a loader named TOSHIS, a variant of the Xiangoop malware historically used by Tropic Trooper. This loader is responsible for deploying the multi-layered attack strategy, which not only distracts users with fake documents but also discreetly installs the AdaptixC2 Beacon in the background.

GitHub as a Command-and-Control Platform

In a unique twist, the attackers have employed GitHub as their command-and-control (C2) platform. This strategy involves the AdaptixC2 agent communicating with attacker-controlled servers to receive instructions for execution on compromised systems. The campaign escalates only when the targeted individuals are deemed valuable, prompting the use of Microsoft Visual Studio Code (VS Code) and its tunnel features for remote access.

In certain cases, the attackers have been observed installing additional trojanized applications on select systems. These applications serve to further obscure their operations, enhancing their ability to remain undetected.

Utilizing Known Backdoors and Tools

The staging server involved in these attacks has been identified as hosting familiar backdoors, including Cobalt Strike Beacon and a custom tool named EntryShell. These tools have been associated with Tropic Trooper’s previous campaigns. According to Zscaler, the threat actors have transitioned from using widely available tools like Cobalt Strike and Mythic Merlin to the AdaptixC2, indicating a shift in their operational tactics.

As cybersecurity experts continue to monitor and investigate this campaign, it underscores the need for heightened vigilance and robust defensive measures to protect against such advanced threats.

The Hacker News Tags:AdaptixC2, APT23, Cybersecurity, GitHub, Malware, SumatraPDF, threat intelligence, Tropic Trooper, VS Code, Zscaler

Post navigation

Previous Post: Trigona Ransomware Group Crafts Custom Data Theft Tool
Next Post: Safeguarding AI Agents Through Effective Delegation

Related Posts

X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts The Hacker News
Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More The Hacker News
Feds Seize .4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain The Hacker News
Dangerous npm Package Steals macOS Credentials Dangerous npm Package Steals macOS Credentials The Hacker News
Why Runtime Visibility Must Take Center Stage Why Runtime Visibility Must Take Center Stage The Hacker News
Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Locked Shields 2026: Global Cyber Defense Unites 41 Nations
  • Critical Python Flaw Enables Memory Overflow on Windows
  • Rethinking Cybersecurity for Autonomous AI Agents
  • 26 Malicious Apps on Apple Store Targeting Crypto Wallets
  • Critical Vulnerability in Xiongmai IP Cameras Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Locked Shields 2026: Global Cyber Defense Unites 41 Nations
  • Critical Python Flaw Enables Memory Overflow on Windows
  • Rethinking Cybersecurity for Autonomous AI Agents
  • 26 Malicious Apps on Apple Store Targeting Crypto Wallets
  • Critical Vulnerability in Xiongmai IP Cameras Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark