Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2
好的,我现在需要帮用户总结这篇文章的内容。用户的要求是用中文,控制在100字以内,不需要特定的开头,直接写文章描述即可。 首先,我快速浏览一下文章内容。文章主要讲的是一个针对说中文的人的新网络攻击活动。攻击者使用了SumatraPDF的恶意版本来部署AdaptixC2 Beacon,进而滥用VS Code隧道进行远程访问。这个活动被归因于Tropic Trooper黑客组织,他们活跃于2011年至今,主要针对台湾、香港和菲律宾的实体。 接下来,我需要提取关键信息:攻击目标、使用的工具、攻击步骤、幕后黑手以及影响范围。然后把这些信息浓缩到100字以内。 可能会遇到的问题是如何在有限的字数内涵盖所有重要点。比如,如何简洁地表达攻击过程和使用的工具?可能需要简化一些技术细节,只保留主要步骤。 然后,我会组织语言,确保句子通顺且信息完整。例如,“Tropic Trooper利用恶意SumatraPDF部署AdaptixC2 Beacon”这样既点明了组织和工具,又说明了行动。 最后检查字数是否符合要求,并确保没有遗漏关键信息。比如提到VS Code隧道和GitHub作为C2平台也是重要的点。 总结下来,应该能够在一个简洁的段落中涵盖所有必要内容。 </think> Tropic Trooper黑客组织利用恶意SumatraPDF部署AdaptixC2 Beacon,并通过VS Code隧道实现远程访问。该活动针对中文用户及台湾、韩国和日本地区,使用GitHub作为C2平台,并结合多阶段payload进行攻击。 2026-4-24 09:29:0 Author: thehackernews.com(查看原文) 阅读量:21 收藏

Malware / Threat Intelligence

Chinese-speaking individuals are the target of a new campaign that uses a trojanized version of SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent and ultimately facilitate the abuse of Microsoft Visual Studio Code (VS Code) tunnels for remote access.

Zscaler ThreatLabz, which discovered the campaign last month, has attributed it with high confidence to Tropic Trooper (aka APT23, Earth Centaur, KeyBoy, and Pirate Panda), a hacking group known for its targeting of various entities in Taiwan, Hong Kong, and the Philippines. It's assessed to be active since at least 2011.

"The threat actors created a custom AdaptixC2 Beacon listener, leveraging GitHub as their command-and-control (C2) platform," security researcher Yin Hong Chang said in an analysis.

It's believed that Chinese-speaking individuals in Taiwan, and individuals in South Korea and Japan, are the targets of the campaign. The starting point of the attack is a ZIP archive containing military-themed document lures to launch the rogue version of SumatraPDF, which is then used to display a decoy PDF document, while simultaneously retrieving encrypted shellcode from a staging server to launch AdaptixC2 Beacon.

To accomplish this, the backdoored SumatraPDF executable launches a slightly modified version of a loader codenamed TOSHIS, which is a variant of Xiangoop, a malware linked to Tropic Trooper, and has been used in the past to fetch next-stage payloads like Cobalt Strike Beacon or Merlin agent for the Mythic framework.

The loader is responsible for activating the multi-stage attack, dropping both the lure document as a distraction mechanism and the AdaptixC2 Beacon agent in the background.The agent employs GitHub for C2, beaconing out to the attacker-controlled infrastructure to fetch tasks to be executed on the compromised host.

The attack moves to the next stage only when the victim is deemed valuable, at which point the threat actor deploys VS Code and sets up VS Code tunnels for remote access. On select machines, the threat actor has been found to install alternative, trojanized applications, likely in an attemptto better camouflage their actions.

What's more, the staging server involved in the intrusion ("158.247.193[.]100") has been observed hosting a Cobalt Strike Beacon and a custom backdoor called EntryShell, both of which have been put to use by Tropic Trooper in the past.

"Similar to the TAOTH campaign, publicly available backdoors are used as payloads," Zscaler said. "While Cobalt Strike Beacon and Mythic Merlin were previously used, the threat actor has now shifted to AdaptixC2."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/tropic-trooper-uses-trojanized.html
如有侵权请联系:admin#unsafe.sh