Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Tropic Trooper Cyberattack Uses Novel Tools for Infiltration

Tropic Trooper Cyberattack Uses Novel Tools for Infiltration

Posted on April 23, 2026 By CWS

A recent cyberattack campaign attributed to the notorious threat group Tropic Trooper has been identified, targeting Chinese-speaking individuals in Taiwan, as well as people in South Korea and Japan. The attack employs military-themed document lures and advanced techniques to compromise systems.

Discovery and Attack Chain

Unveiled on March 12, 2026, researchers encountered a malicious ZIP archive initiating a multi-stage attack designed for persistent access. This campaign is notable for its use of open-source tools combined with unconventional exploitation of developer infrastructure.

The attack utilizes a trojanized version of the SumatraPDF reader, masquerading as a document titled “Comparative Analysis of US-UK and US-Australia Nuclear Submarine Cooperation (2025).exe.” Running the file downloads a genuine-looking PDF while secretly deploying an AdaptixC2 Beacon agent, compromising the system without alerting the user.

Technical Insights and Attribution

Experts from Zscaler ThreatLabz have linked the attack to Tropic Trooper, also known as Earth Centaur and Pirate Panda. The group’s use of a loader similar to the TOSHIS loader, previously associated with them, supports this attribution. Additional tools found on the staging server, including a Cobalt Strike Beacon with a “520” watermark and an EntryShell backdoor, further corroborate their involvement.

The campaign showcases a strategic shift in Tropic Trooper’s methods, moving from traditional backdoors to the AdaptixC2 framework. The use of open-source tools complicates attribution and facilitates reuse across operations, a trend among advanced persistent threat groups in the Asia-Pacific region.

Innovative Use of GitHub and VS Code

A unique aspect of this campaign is the use of Visual Studio Code tunnels for remote access, performed post-compromise. This method involves creating scheduled tasks for persistence and conducting network reconnaissance, utilizing VS Code’s trusted infrastructure to evade detection.

Furthermore, the campaign employs a custom AdaptixC2 beacon listener that communicates via GitHub. By interacting with a GitHub repository, the beacon reads task assignments and uploads results, blending malicious activity with legitimate developer traffic.

The beacon sends encrypted communications to GitHub, using RC4 encryption and quickly deleting interactions to prevent detection. This innovative approach makes it challenging for network defenders to distinguish between malicious and regular activity.

Protective Measures and Recommendations

Organizations should implement measures to mitigate such threats, including monitoring unexpected GitHub API endpoint traffic, enforcing strict application allowlisting to block trojanized binaries, and auditing VS Code tunnel usage. It’s also crucial to monitor for unusual scheduled tasks and IP-lookup service usage.

Proactive email and file gateway controls can help detect and block malicious ZIP archives disguised as documents, reducing exposure to similar attack vectors.

Stay informed by following our updates on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for the latest cybersecurity news.

Cyber Security News Tags:AdaptixC2, APT, APT groups, Asia-Pacific, cyber threat, Cybersecurity, GitHub, remote access, Threat Actors, Tropic Trooper, VS Code, Zscaler

Post navigation

Previous Post: Cloudsmith Secures $72M in Series C Funding Boost
Next Post: Cybersecurity Threats: DeFi Hack & AI Vulnerabilities

Related Posts

Avoid Fake Traffic Ticket Sites Stealing Your Data Avoid Fake Traffic Ticket Sites Stealing Your Data Cyber Security News
Threat Actors Leverage RMM Tools to Hack Trucking Companies and Steal Cargo Freight Threat Actors Leverage RMM Tools to Hack Trucking Companies and Steal Cargo Freight Cyber Security News
New ClickFix Attack Targeting Windows and macOS Users to Deploy Infostealer Malware New ClickFix Attack Targeting Windows and macOS Users to Deploy Infostealer Malware Cyber Security News
Underground Ransomware Gang With New Tactics Against Organizations Worldwide Underground Ransomware Gang With New Tactics Against Organizations Worldwide Cyber Security News
Active Directory Breach: Hackers Target NTDS.dit File Active Directory Breach: Hackers Target NTDS.dit File Cyber Security News
Securden Unified PAM Vulnerability Let Attackers Bypass Authentication Securden Unified PAM Vulnerability Let Attackers Bypass Authentication Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybersecurity Threats: DeFi Hack & AI Vulnerabilities
  • Tropic Trooper Cyberattack Uses Novel Tools for Infiltration
  • Cloudsmith Secures $72M in Series C Funding Boost
  • Bitwarden CLI Breach Highlights Supply Chain Risks
  • Fake Trading Platform Spreads Needle Stealer Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybersecurity Threats: DeFi Hack & AI Vulnerabilities
  • Tropic Trooper Cyberattack Uses Novel Tools for Infiltration
  • Cloudsmith Secures $72M in Series C Funding Boost
  • Bitwarden CLI Breach Highlights Supply Chain Risks
  • Fake Trading Platform Spreads Needle Stealer Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark