radar

ONE Sentinel

securitySecurity/THREATS/HIGH

Tropic Trooper Uses Trojanized SumatraPDF and GitHub to Deploy AdaptixC2

sourceThe Hacker News
calendar_todayApril 24, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Tropic Trooper Exploits SumatraPDF to Deploy AdaptixC2 via GitHub

Summary

A new cyber campaign targets Chinese-speaking individuals using a trojanized version of SumatraPDF to deploy the AdaptixC2 Beacon. This facilitates the misuse of Microsoft Visual Studio Code tunnels for remote access.

Key Points

  • The campaign was discovered by Zscaler ThreatLabz last month.
  • It is attributed to the Tropic Trooper group with high confidence.
  • The attack involves a trojanized SumatraPDF reader.
  • AdaptixC2 Beacon is used as a post-exploitation agent.
  • Microsoft Visual Studio Code tunnels are abused for remote access.

Analysis

This campaign highlights the evolving tactics of threat actors like Tropic Trooper, who are leveraging legitimate software and services to conduct their operations. The use of a trojanized SumatraPDF reader and GitHub for deployment showcases the sophistication and stealth of modern cyber threats, emphasizing the need for vigilance among IT professionals.

Conclusion

IT professionals should ensure that software is sourced from trusted vendors and regularly updated. Monitoring for unusual activity, especially involving legitimate applications, is crucial to mitigate such threats.