Skip to content
MagnaNet Network MagnaNet Network

  • Home
  • About Us
    • About Us
    • Advertising Policy
    • Cookie Policy
    • Affiliate Disclosure
    • Disclaimer
    • DMCA
    • Terms of Service
    • Privacy Policy
  • Contact Us
  • FAQ
  • Sitemap
MagnaNet Network
MagnaNet Network

Tropic Trooper Unleashes New AdaptixC2 Campaign Targeting Chinese-Speaking Individuals via Trojanized SumatraPDF and VS Code Tunnels

Cahyo Dewo, April 26, 2026

A sophisticated and evolving cyber espionage campaign, attributed with high confidence to the notorious Chinese-speaking advanced persistent threat (APT) group known as Tropic Trooper (also identified as APT23, Earth Centaur, KeyBoy, and Pirate Panda), has been uncovered, revealing a strategic shift in their toolset and methodologies. The campaign primarily targets Chinese-speaking individuals across Taiwan, Hong Kong, the Philippines, and extends its reach to include entities in South Korea and Japan. At the heart of this new operation is the deployment of a trojanized version of the legitimate SumatraPDF reader, which serves as the initial vector for introducing the AdaptixC2 Beacon post-exploitation agent. This intricate scheme culminates in the illicit abuse of Microsoft Visual Studio Code (VS Code) tunnels, establishing persistent and covert remote access to compromised systems.

Unmasking Tropic Trooper: A Persistent Threat

The discovery, made by researchers at Zscaler ThreatLabz last month, underscores the persistent and adaptable nature of Tropic Trooper, a hacking collective believed to have been active since at least 2011. This group has a well-documented history of targeting various governmental, military, technology, and critical infrastructure entities within its geographical areas of interest. Their longevity and consistent operational tempo highlight a formidable capability in cyber espionage, continuously refining their tactics, techniques, and procedures (TTPs) to evade detection and achieve their objectives. The aliases associated with Tropic Trooper—APT23, Earth Centaur, KeyBoy, and Pirate Panda—reflect the diverse names used by different cybersecurity firms tracking their activities, all pointing to a singular, state-aligned (or state-sponsored) entity operating out of China. Their objectives typically revolve around intelligence gathering, intellectual property theft, and strategic data exfiltration, aligning with broader national interests.

The Initial Infiltration: A Lure of Deception

The attack commences with a classic but effective social engineering tactic: weaponized document lures. Victims are initially targeted through ZIP archives containing seemingly innocuous, often military-themed, documents. This choice of theme is particularly potent given the geopolitical landscape and the group’s historical targeting of defense-related sectors in Taiwan, a region frequently at the forefront of cyber espionage activities. Upon execution, the trojanized SumatraPDF reader serves a dual purpose. Ostensibly, it displays a decoy PDF document, presenting the lure content to the unsuspecting user. This serves as a distraction, maintaining the illusion of a legitimate file opening and allowing the malicious processes to unfold in the background without raising immediate suspicion.

Simultaneously, and crucially, this rogue SumatraPDF executable initiates the next stage of the attack. It covertly retrieves encrypted shellcode from a pre-configured staging server. Shellcode, a small piece of code used as a payload in software exploitation, is designed to execute specific actions, in this case, to launch the AdaptixC2 Beacon. This method allows the attackers to maintain a low profile, leveraging a seemingly legitimate application to execute highly malicious code.

TOSHIS Loader: The Backbone of Deployment

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

To achieve the seamless deployment of the AdaptixC2 Beacon, the backdoored SumatraPDF executable launches a subtly modified version of a loader codenamed TOSHIS. TOSHIS is not a new discovery; it is a known variant of Xiangoop, a malware family previously linked to Tropic Trooper. Its re-emergence in this campaign underscores the group’s reliance on proven tools while adapting them for new operations. In past campaigns, TOSHIS has been instrumental in fetching subsequent-stage payloads, including powerful post-exploitation frameworks such as Cobalt Strike Beacon and the Merlin agent for the Mythic framework. This historical context illustrates TOSHIS’s role as a versatile and robust component in Tropic Trooper’s arsenal, capable of delivering a wide array of malicious tools depending on the specific objectives of the compromise.

The loader’s primary responsibility is to orchestrate the multi-stage attack. It ensures that while the decoy document is displayed to the user, the AdaptixC2 Beacon agent is dropped and executed surreptitiously in the background. This sophisticated choreography of actions highlights the meticulous planning and technical prowess of Tropic Trooper, ensuring that initial compromise leads swiftly and stealthily to persistent access.

AdaptixC2: The New Post-Exploitation Framework

A significant shift observed in this campaign is Tropic Trooper’s pivot from previously favored post-exploitation tools like Cobalt Strike and Mythic Merlin to AdaptixC2. As noted by security researcher Yin Hong Chang of Zscaler ThreatLabz, the threat actors have specifically created a custom AdaptixC2 Beacon listener. AdaptixC2 is a sophisticated post-exploitation framework designed to provide attackers with extensive control over compromised systems. Its capabilities typically include command execution, file system manipulation, network reconnaissance, lateral movement, and data exfiltration. The use of a custom listener indicates the group’s intent to tailor the framework to their specific operational needs, potentially to enhance stealth or integrate better with their existing infrastructure.

Crucially, AdaptixC2 employs GitHub as its command-and-control (C2) platform. This strategy leverages legitimate web services to blend malicious traffic with normal network activity, making detection significantly more challenging for conventional security tools. By beaconing out to attacker-controlled repositories or Gists on GitHub, the agent fetches tasks and commands to be executed on the compromised host. This method provides a resilient and dynamic C2 channel, difficult to block without impacting legitimate GitHub usage, thereby prolonging the attackers’ presence within the targeted network.

Escalation and Persistence: The Abuse of VS Code Tunnels

The campaign demonstrates a highly selective approach to post-exploitation. The attack only progresses to its subsequent, more intrusive stages once the victim’s system is deemed valuable by the threat actor. This suggests a careful triage process, where initial compromises are evaluated for strategic importance before committing further resources. For high-value targets, Tropic Trooper deploys Microsoft Visual Studio Code (VS Code) and then establishes VS Code tunnels for remote access.

VS Code tunnels are a legitimate feature designed to allow developers to access their development environments remotely and securely, often across different machines or network boundaries. However, in the hands of malicious actors, this feature becomes a potent tool for maintaining persistent, covert remote access. By configuring a VS Code tunnel, Tropic Trooper can establish a direct, encrypted connection to the compromised machine, bypassing traditional firewall rules and network segmentation. This grants them unparalleled access to the system, enabling deeper reconnaissance, privilege escalation, data exfiltration, and the deployment of additional tools. The use of such a widely adopted and trusted development environment for malicious purposes exemplifies the trend of "living off the land," where attackers abuse legitimate tools and services to mask their activities and evade detection. On select machines, Zscaler also observed the installation of alternative, trojanized applications, likely intended to further camouflage their ongoing operations and provide additional persistence mechanisms or functionalities tailored to the specific target environment.

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

Historical Linkages and Evolving Toolsets

Further corroborating the attribution to Tropic Trooper, the staging server identified in this intrusion, "158.247.193[.]100," has been historically associated with the group. This server has been observed hosting other known Tropic Trooper tools, including a Cobalt Strike Beacon and a custom backdoor named EntryShell. EntryShell, detailed in various cybersecurity reports and conferences such as HITCON 2024, is another bespoke tool within Tropic Trooper’s extensive arsenal, used for persistent access and command execution. The presence of these familiar artifacts on the staging server provides strong forensic evidence linking the current campaign to the group’s past operations.

Zscaler’s analysis highlights a clear evolution in Tropic Trooper’s toolkit: "Similar to the TAOTH campaign, publicly available backdoors are used as payloads. While Cobalt Strike Beacon and Mythic Merlin were previously used, the threat actor has now shifted to AdaptixC2." This strategic pivot suggests several possibilities: a desire to reduce reliance on commercially available (and therefore more widely recognized and detectable) tools like Cobalt Strike, an effort to increase operational security by using less common or custom frameworks, or simply an adaptation to new defensive measures deployed by their targets. AdaptixC2 may offer specific features or stealth capabilities that align better with Tropic Trooper’s current objectives or target environments.

Geopolitical Context and Target Profile

The geographical focus of this campaign—Chinese-speaking individuals in Taiwan, Hong Kong, and the Philippines, along with targets in South Korea and Japan—is deeply rooted in geopolitical realities. Taiwan, a self-governing democracy claimed by Beijing, is a perennial target for cyber espionage aimed at intelligence gathering, military assessments, and influence operations. Hong Kong, with its complex political status, represents another sensitive region. The Philippines, due to its strategic location in the South China Sea and increasing alignment with Western powers, also falls within the purview of Chinese state-backed cyber interests. The inclusion of South Korea and Japan further broadens the scope, indicating an interest in regional political, economic, or technological intelligence. These nations are key players in the Indo-Pacific, and intelligence gathered from them could provide strategic advantages to state-sponsored actors.

Tropic Trooper’s historical targeting patterns have consistently aligned with these geopolitical interests, focusing on government agencies, defense contractors, telecommunications companies, and critical infrastructure providers. The use of military-themed lures in this campaign specifically suggests an ongoing interest in defense intelligence or targeting individuals within military or government-adjacent circles.

Expert Analysis and Implications

Cybersecurity experts view this campaign as a testament to the enduring threat posed by sophisticated APT groups. "The shift to AdaptixC2 and the weaponization of legitimate tools like SumatraPDF and VS Code tunnels exemplify the continuous cat-and-mouse game in cybersecurity," stated one independent analyst, who preferred to remain anonymous due to the sensitivity of the topic. "Attackers are constantly innovating, moving away from easily identifiable malware signatures towards techniques that blend into normal network traffic, making detection significantly harder."

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

The abuse of legitimate services like GitHub for C2 and VS Code for remote access represents a significant challenge for network defenders. Traditional security solutions often whitelist these services, making it difficult to differentiate between legitimate and malicious usage. This requires a shift towards more advanced behavioral analytics, threat intelligence integration, and continuous monitoring of network activity for anomalies, rather than solely relying on signature-based detection.

The implications for organizations in the targeted regions are substantial. These entities face an elevated risk of intellectual property theft, sensitive data exfiltration, and long-term espionage. The sophisticated nature of the attack, particularly the multi-stage deployment and the use of covert remote access, suggests that compromised networks could harbor undetected adversaries for extended periods, potentially leading to significant data breaches and strategic disadvantages. Governments and private sector entities in Taiwan, Hong Kong, the Philippines, South Korea, and Japan are urged to enhance their cybersecurity postures, conduct thorough threat hunting exercises, and educate their employees on the dangers of social engineering and suspicious attachments.

Recommendations and Defensive Strategies

To mitigate the risks posed by campaigns like the one orchestrated by Tropic Trooper, organizations must adopt a multi-layered security approach:

  1. Employee Training: Implement robust security awareness training programs to educate employees about social engineering tactics, phishing attempts, and the dangers of opening suspicious attachments, even if they appear to come from trusted sources or mimic legitimate applications.
  2. Endpoint Detection and Response (EDR): Deploy and configure advanced EDR solutions to monitor endpoint activity for suspicious behaviors, even if they involve legitimate applications. EDR can help detect the execution of shellcode, unusual process chains, and unauthorized use of development tools like VS Code for tunnel creation.
  3. Network Segmentation and Monitoring: Implement strong network segmentation to limit lateral movement in case of a breach. Continuously monitor network traffic for anomalous C2 communications, especially those leveraging legitimate services like GitHub. Implement egress filtering to restrict outbound connections to only necessary services.
  4. Application Whitelisting: Consider implementing application whitelisting to control which executables are permitted to run on endpoints. While challenging for common applications like SumatraPDF, this can prevent the execution of unauthorized or trojanized versions.
  5. Vulnerability Management and Patching: Ensure all software, operating systems, and applications are regularly updated and patched to address known vulnerabilities that could be exploited by attackers.
  6. Threat Intelligence Sharing: Participate in threat intelligence sharing initiatives to stay informed about the latest TTPs of APT groups like Tropic Trooper. This allows organizations to proactively adjust their defenses.
  7. Incident Response Planning: Develop and regularly test comprehensive incident response plans to ensure a swift and effective reaction in the event of a successful breach, minimizing damage and recovery time.
  8. Identity and Access Management: Implement strong authentication mechanisms, including multi-factor authentication (MFA), and enforce the principle of least privilege to limit the impact of compromised credentials.

The latest campaign by Tropic Trooper serves as a stark reminder of the ever-present and evolving cyber threat landscape. Their continuous adaptation of tools and techniques, from deploying custom post-exploitation frameworks like AdaptixC2 to abusing legitimate software features such as VS Code tunnels, underscores the sophisticated nature of state-aligned cyber espionage. As cybersecurity defenses strengthen, threat actors will undoubtedly continue to innovate, making vigilance, robust security practices, and proactive threat intelligence more critical than ever for organizations operating in vulnerable geopolitical regions.

Cybersecurity & Digital Privacy adaptixccampaignchinesecodeCybercrimeHackingindividualsPrivacySecurityspeakingsumatrapdftargetingtrojanizedtroopertropictunnelsunleashes

Post navigation

Previous post
Next post

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

The Evolving Landscape of Telecommunications in Laos: A Comprehensive Analysis of Market Dynamics, Infrastructure Growth, and Future ProspectsTelesat Delays Lightspeed LEO Service Entry to 2028 While Expanding Military Spectrum Capabilities and Reporting 2025 Fiscal PerformanceThe Internet of Things Podcast Concludes After Eight Years, Charting a Course for the Future of Smart HomesOxide induced degradation in MoS2 field-effect transistors
AWS Marks Two Decades of Cloud Computing Leadership and Relentless InnovationPhysical Servers vs. Virtual Servers: A Comprehensive Guide to Modern InfrastructureAWS Launches Agent Registry to Centralize and Streamline AI Agent Discovery and GovernancePgEdge MCP Server for Postgres Launches, Ushering in a New Era for AI-Powered Databases
AWS Marks Two Decades of Foundational Cloud Storage with S3 Anniversary, Unveils Global DNS Resolver and Enhanced Storage Management FeaturesMovistar Plus+ Redefines Spanish Streaming Landscape with Diverse Plans, Including a Groundbreaking Free Tier, Aiming for Broader Market PenetrationAI Productivity Promises Fall Short as Organizations Grapple with Real-World Adoption ChallengesTropic Trooper Unleashes New AdaptixC2 Campaign Targeting Chinese-Speaking Individuals via Trojanized SumatraPDF and VS Code Tunnels

Categories

  • AI & Machine Learning
  • Blockchain & Web3
  • Cloud Computing & Edge Tech
  • Cybersecurity & Digital Privacy
  • Data Center & Server Infrastructure
  • Digital Transformation & Strategy
  • Enterprise Software & DevOps
  • Global Telecom News
  • Internet of Things & Automation
  • Network Infrastructure & 5G
  • Semiconductors & Hardware
  • Space & Satellite Tech
©2026 MagnaNet Network | WordPress Theme by SuperbThemes