Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Tropic Trooper Utilizes Trojanized Software for Cyber Attacks

Tropic Trooper Utilizes Trojanized Software for Cyber Attacks

Posted on April 24, 2026 By CWS

A recent cybersecurity study has revealed a sophisticated attack campaign targeting Chinese-speaking populations. The campaign, discovered by Zscaler ThreatLabz, involves a compromised version of the SumatraPDF reader that deploys the AdaptixC2 Beacon post-exploitation agent. This operation is linked to the notorious hacking group, Tropic Trooper, also known as APT23, Earth Centaur, KeyBoy, and Pirate Panda, with a history of targeting Taiwan, Hong Kong, and the Philippines since 2011.

Exploiting Software to Gain Access

The intrusion begins with a ZIP archive containing military-themed documents, which are designed to bait victims into launching the tampered SumatraPDF application. Once initiated, this altered software runs a decoy PDF file while simultaneously downloading encrypted shellcode from a staging server. This shellcode is crucial for launching AdaptixC2 Beacon, a tool that facilitates further malicious activities.

The backdoored SumatraPDF operates alongside a loader named TOSHIS, a variant of the Xiangoop malware historically used by Tropic Trooper. This loader is responsible for deploying the multi-layered attack strategy, which not only distracts users with fake documents but also discreetly installs the AdaptixC2 Beacon in the background.

GitHub as a Command-and-Control Platform

In a unique twist, the attackers have employed GitHub as their command-and-control (C2) platform. This strategy involves the AdaptixC2 agent communicating with attacker-controlled servers to receive instructions for execution on compromised systems. The campaign escalates only when the targeted individuals are deemed valuable, prompting the use of Microsoft Visual Studio Code (VS Code) and its tunnel features for remote access.

In certain cases, the attackers have been observed installing additional trojanized applications on select systems. These applications serve to further obscure their operations, enhancing their ability to remain undetected.

Utilizing Known Backdoors and Tools

The staging server involved in these attacks has been identified as hosting familiar backdoors, including Cobalt Strike Beacon and a custom tool named EntryShell. These tools have been associated with Tropic Trooper’s previous campaigns. According to Zscaler, the threat actors have transitioned from using widely available tools like Cobalt Strike and Mythic Merlin to the AdaptixC2, indicating a shift in their operational tactics.

As cybersecurity experts continue to monitor and investigate this campaign, it underscores the need for heightened vigilance and robust defensive measures to protect against such advanced threats.

The Hacker News Tags:AdaptixC2, APT23, Cybersecurity, GitHub, Malware, SumatraPDF, threat intelligence, Tropic Trooper, VS Code, Zscaler

Post navigation

Previous Post: Trigona Ransomware Group Crafts Custom Data Theft Tool
Next Post: Safeguarding AI Agents Through Effective Delegation

Related Posts

Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More The Hacker News
CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation The Hacker News
FCC Restricts New Import of Foreign Routers Over Security Risks FCC Restricts New Import of Foreign Routers Over Security Risks The Hacker News
Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents The Hacker News
Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features Android Malware FvncBot, SeedSnatcher, and ClayRat Gain Stronger Data Theft Features The Hacker News
GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • US Federal Agency Hit by Firestarter Backdoor in Cisco Firewalls
  • Safeguarding AI Agents Through Effective Delegation
  • Tropic Trooper Utilizes Trojanized Software for Cyber Attacks
  • Trigona Ransomware Group Crafts Custom Data Theft Tool
  • Critical Flaws Addressed in CrowdStrike and Tenable Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • US Federal Agency Hit by Firestarter Backdoor in Cisco Firewalls
  • Safeguarding AI Agents Through Effective Delegation
  • Tropic Trooper Utilizes Trojanized Software for Cyber Attacks
  • Trigona Ransomware Group Crafts Custom Data Theft Tool
  • Critical Flaws Addressed in CrowdStrike and Tenable Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark