
🎯Basically, a hacking group is using fake software to steal information from people.
What Happened
A new cyber campaign has emerged, attributed to the Tropic Trooper hacking group. This group is known for targeting Chinese-speaking individuals, particularly in Taiwan, South Korea, and Japan. They are using a trojanized version of the SumatraPDF reader to deploy the AdaptixC2 Beacon post-exploitation agent. This malware facilitates remote access through Microsoft Visual Studio Code tunnels.
Who's Being Targeted
The primary targets of this campaign are Chinese-speaking individuals. The attackers have focused their efforts on various entities in Taiwan, Hong Kong, and the Philippines. The campaign is particularly concerning due to its sophisticated approach and the use of familiar software to lure victims.
How It Works
The attack starts with a ZIP archive that contains military-themed document lures. When the victim opens the rogue version of SumatraPDF, it displays a decoy PDF while simultaneously retrieving encrypted shellcode from a staging server. This shellcode launches the AdaptixC2 Beacon agent, which is designed to communicate with the attacker's infrastructure via GitHub as a command-and-control (C2) platform.
Signs of Infection
Victims may notice unusual activity on their systems, especially if they have installed the trojanized SumatraPDF. Signs include unexpected remote access requests or the presence of unfamiliar applications like the AdaptixC2 Beacon agent.
How to Protect Yourself
To safeguard against this threat, users should:
Detection
- 1.Avoid downloading software from untrusted sources.
- 2.Regularly update all software to the latest versions.
Removal
- 3.Use reputable antivirus solutions to detect and block malware.
- 4.Monitor system activity for any unauthorized access attempts.
Conclusion
The Tropic Trooper campaign highlights the evolving tactics of cybercriminals. By leveraging familiar software like SumatraPDF, they can effectively target and exploit unsuspecting users. Awareness and proactive security measures are essential to combat such threats.
🔒 Pro insight: The use of GitHub as a C2 platform exemplifies the increasing sophistication of APT groups leveraging legitimate services for malicious purposes.





