Tropic Trooper Leverages Compromised Software for Advanced Persistent Threat Operations

Tropic Trooper Leverages Compromised Software for Advanced Persistent Threat Operations
A sophisticated threat actor is exploiting a trojanized PDF reader and cloud services to gain persistent access and execute post-exploitation activities, targeting individuals across East Asia. The campaign highlights the evolving tactics of advanced persistent threats (APTs) in leveraging legitimate infrastructure for malicious purposes.
Published: 2026-04-24 | Author: Patrick Mattos
A new cyber espionage campaign, attributed with high confidence to the Chinese-speaking threat group Tropic Trooper, is actively targeting individuals in Taiwan, South Korea, and Japan. The operation employs a multi-stage approach, beginning with a trojanized version of the SumatraPDF reader. This initial compromise is designed to deploy a custom post-exploitation agent and ultimately establish remote access through the abuse of Microsoft Visual Studio Code (VS Code) tunnels.
The campaign, detailed by Zscaler ThreatLabz, demonstrates a calculated effort by Tropic Trooper to blend in and maintain a low profile. By utilizing GitHub as a command-and-control (C2) platform and deploying familiar tools alongside custom malware, the group aims to evade detection and prolong its presence on compromised systems. This sophisticated tradecraft underscores the persistent threat posed by well-resourced APTs.
Technical Context
The attack chain commences with a ZIP archive containing military-themed documents, designed to lure victims into opening a compromised SumatraPDF executable. Upon execution, the trojanized application displays a decoy PDF while surreptitiously downloading encrypted shellcode from a staging server. This shellcode activates a loader, identified as TOSHIS, a variant of the Xiangoop malware previously linked to Tropic Trooper.
The TOSHIS loader's primary function is to orchestrate the multi-stage payload delivery. It drops both the decoy document and the AdaptixC2 Beacon agent in the background. The AdaptixC2 Beacon then leverages GitHub for its C2 communications, receiving instructions for execution on the victim's machine. This method of using cloud platforms for C2 is a common tactic to blend in with legitimate network traffic.
Further stages of the attack are triggered selectively, based on the perceived value of the compromised host. In more advanced intrusions, threat actors have been observed installing VS Code and configuring VS Code tunnels to establish persistent remote access. This allows for direct, encrypted communication channels that can bypass traditional network defenses. The staging server has also been noted to host other tools previously used by Tropic Trooper, including Cobalt Strike Beacon and a custom backdoor named EntryShell, indicating a consistent toolkit and operational methodology.
Impact and Risk
The primary targets of this campaign appear to be Chinese-speaking individuals in Taiwan, with extensions into South Korea and Japan. The risk level is considered high due to the sophisticated nature of the attack and the APT group's history of persistent espionage operations. Organizations and individuals in these regions, particularly those involved in sensitive industries or government-related activities, are at significant risk of compromise.
The use of legitimate software and cloud services for malicious purposes makes detection challenging, increasing the likelihood of prolonged unauthorized access. The ultimate impact can range from data exfiltration and intellectual property theft to espionage and disruption of critical operations, depending on the specific objectives of Tropic Trooper.
Defensive Takeaways
Organizations should implement robust endpoint detection and response (EDR) solutions capable of identifying anomalous process behavior, such as unusual child processes spawned by legitimate applications like SumatraPDF. Network security monitoring should focus on detecting suspicious outbound connections to cloud services, especially those used for command and control.
User education remains critical, emphasizing caution when opening attachments from unknown or unexpected sources, even if they appear to be from trusted applications. Regularly updating all software, including PDF readers and development tools like VS Code, is essential to patch known vulnerabilities. For advanced threat hunting, monitoring for the use of VS Code tunnels for remote access, especially when not part of standard IT operations, can provide early indicators of compromise.
