Tropic Trooper - New Trojanized SumatraPDF Campaign Uncovered

A new campaign by Tropic Trooper uses a trojanized version of SumatraPDF to deploy the AdaptixC2 malware. This targets Chinese-speaking individuals for remote access. Users should be cautious and ensure their software is secure.

Malware & RansomwareHIGHUpdated: Published:
Featured image for Tropic Trooper - New Trojanized SumatraPDF Campaign Uncovered

Original Reporting

THThe Hacker News

AI Summary

CyberPings AI·Reviewed by Rohit Rana

🎯Basically, a hacking group is using fake software to steal information from people.

What Happened

A new cyber campaign has emerged, attributed to the Tropic Trooper hacking group. This group is known for targeting Chinese-speaking individuals, particularly in Taiwan, South Korea, and Japan. They are using a trojanized version of the SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent. This malware facilitates remote access through Microsoft Visual Studio Code tunnels.

Who's Being Targeted

The primary targets of this campaign are Chinese-speaking individuals. The attackers have focused their efforts on various entities in Taiwan, Hong Kong, and the Philippines. The campaign is particularly concerning due to its sophisticated approach and the use of familiar software to lure victims.

How It Works

The attack starts with a ZIP archive that contains military-themed document lures. When the victim opens the rogue version of SumatraPDF, it displays a decoy PDF while simultaneously retrieving encrypted shellcode from a staging server. This shellcode launches the AdaptixC2 Beacon agent, which is designed to communicate with the attacker's infrastructure via GitHub as a command-and-control (C2) platform.

Signs of Infection

Victims may notice unusual activity on their systems, especially if they have installed the trojanized SumatraPDF. Signs include unexpected remote access requests or the presence of unfamiliar applications like the AdaptixC2 Beacon agent.

How to Protect Yourself

To safeguard against this threat, users should:

Detection

  • 1.Avoid downloading software from untrusted sources.
  • 2.Regularly update all software to the latest versions.

Removal

  • 3.Use reputable antivirus solutions to detect and block malware.
  • 4.Monitor system activity for any unauthorized access attempts.

Conclusion

The Tropic Trooper campaign highlights the evolving tactics of cybercriminals. By leveraging familiar software like SumatraPDF, they can effectively target and exploit unsuspecting users. Awareness and proactive security measures are essential to combat such threats.

🔒 Pro Insight

🔒 Pro insight: The use of GitHub as a C2 platform exemplifies the increasing sophistication of APT groups leveraging legitimate services for malicious purposes.

THThe Hacker News
Read Original

Related Pings