Tropic Trooper APT Targets Chinese Speakers with Trojanized PDF Reader, Uses GitHub for C2

Tropic Trooper (APT23) Deploys Custom Beacon via Trojanized SumatraPDF, Abuses GitHub and VS Code Tunnels for Espionage

HIGH
April 24, 2026
5m read
Threat ActorCyberattackMalware

Related Entities

Threat Actors

Organizations

Products & Tech

Other

GitHub AdaptixC2 BeaconTOSHISXiangoopEntryShellCobalt Strike

Full Report

Executive Summary

The advanced persistent threat (APT) group Tropic Trooper (also known as APT23, Pirate Panda) has been attributed to a new cyber-espionage campaign observed in March 2026. Researchers at Zscaler's ThreatLabz report with high confidence that the group is targeting Chinese-speaking individuals, likely in Taiwan, South Korea, and Japan, with military-themed lures. The attack chain begins with a trojanized version of the legitimate SumatraPDF reader. When executed, it deploys a custom post-exploitation agent called AdaptixC2 Beacon. In a novel command-and-control (C2) tactic, this beacon uses GitHub's API to receive commands and exfiltrate data, hiding its traffic within legitimate developer activity. For persistent access to high-value targets, the group was also observed using Microsoft Visual Studio Code tunnels. The campaign leverages a complex toolset including a loader named TOSHIS and a backdoor called EntryShell, reinforcing the attribution to Tropic Trooper.

Threat Overview

Threat Actor: Tropic Trooper (APT23, Earth Centaur, KeyBoy, Pirate Panda) Targets: Chinese-speaking individuals and organizations, with a focus on Taiwan, South Korea, and Japan. Malware: AdaptixC2 Beacon, TOSHIS (loader, variant of Xiangoop), EntryShell (backdoor), Cobalt Strike Beacon. Infrastructure: 158.247.193.100 (staging server), GitHub repositories (for C2). Primary Goal: Cyber espionage and long-term intelligence gathering.

The campaign demonstrates Tropic Trooper's continued evolution, incorporating living-off-the-land techniques and abusing legitimate services to evade detection. The use of military-themed documents suggests a focus on government, defense, or political targets.

Technical Analysis

The attack is multi-staged and relies on social engineering to initiate.

  1. Initial Access & Execution: (T1204.002 - Malicious File) The victim receives a ZIP archive with a lure document, such as Comparative Analysis of US-UK and US-Australia Nuclear Submarine Cooperation (2025).exe. This executable is a trojanized version of SumatraPDF.
  2. Defense Evasion & Payload Delivery: (T1140 - Deobfuscate/Decode Files or Information) Upon execution, the legitimate PDF reader displays a decoy document. In the background, it runs a loader called TOSHIS. TOSHIS connects to a staging server (158.247.193.100) to download an encrypted shellcode.
  3. Beacon Deployment: The shellcode is decrypted and executed in memory, launching the AdaptixC2 Beacon.
  4. Command and Control: (T1102.002 - Bidirectional Communication) The AdaptixC2 Beacon uses the GitHub API to communicate. It reads commands from GitHub issues and exfiltrates data by posting to the repository, effectively using GitHub as its C2 server.
  5. Persistence & Remote Access: (T1105 - Ingress Tool Transfer) For high-value targets, the actors deploy Microsoft Visual Studio Code and establish a VS Code tunnel. This provides them with persistent, encrypted remote access that blends in with legitimate remote development or administration traffic.

The staging server was also found hosting a Cobalt Strike Beacon and a custom backdoor named EntryShell, tools previously associated with Tropic Trooper.

Impact Assessment

The impact of this campaign is primarily espionage-related. By gaining persistent access to the systems of individuals in government, policy, or defense circles, Tropic Trooper can exfiltrate sensitive documents, monitor communications, and gather long-term intelligence. The use of VS Code tunnels provides a stealthy and resilient foothold within a target network, making eviction difficult. While not directly destructive, the loss of confidential strategic, political, or military information can have significant national security implications for the targeted countries. The abuse of trusted platforms like GitHub and VS Code for malicious purposes also makes detection harder for network defenders, as blocking these services is often not feasible.

IOCs — Directly from Articles

Type
ip_address_v4
Value
158.247.193.100
Description
Staging server used to host payloads.
Type
file_name
Value
Comparative Analysis of US-UK and US-Australia Nuclear Submarine Cooperation (2025).exe
Description
Malicious executable masquerading as a document.

Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns to detect this activity:

Type
url_pattern
Value
api.github.com/repos/{user}/{repo}/issues
Description
Network traffic pattern for C2 communication via GitHub issues. Monitor for suspicious or unauthorized processes making these API calls.
Type
process_name
Value
code.exe
Description
Execution of Visual Studio Code in a server environment or by a user who is not a developer could be suspicious.
Type
command_line_pattern
Value
code tunnel
Description
The command used to initiate a VS Code tunnel for remote access. Monitor for this in command-line logs.
Type
network_traffic_pattern
Value
Outbound connections to *.rel.tunnels.api.visualstudio.com
Description
The domain used for VS Code tunnel connections. Connections from servers or non-developer workstations are highly suspect.

Detection & Response

  • Network Monitoring: Monitor for outbound connections to api.github.com. While legitimate, traffic from non-developer tools or suspicious processes should be investigated. Use URL Analysis to inspect the full API path for suspicious repository names.
  • Endpoint Detection: Deploy EDR to monitor for process execution chains. A PDF reader spawning network connections to GitHub or launching command shells is highly anomalous. Create detection rules for the code tunnel command line.
  • Application Control: Use application allowlisting (D3-EAL: Executable Allowlisting) to prevent the execution of unauthorized applications like the trojanized SumatraPDF.exe.
  • Response: If a VS Code tunnel is detected, treat it as an active hands-on-keyboard incident. Isolate the host and investigate all activity performed through the tunnel. Revoke any credentials that may have been used or exposed on the compromised machine.

Mitigation

  • User Training: Train users to be suspicious of unsolicited attachments, especially executables masquerading as documents (M1017 - User Training).
  • Email Security: Implement email security gateways to scan and block malicious attachments and ZIP files.
  • Restrict Web-Based Content: If feasible, restrict or monitor outbound connections to code-hosting platforms like GitHub from non-developer systems (M1021 - Restrict Web-Based Content).
  • Disable or Remove Feature or Program: For server environments, disable or remove developer tools like VS Code unless there is a clear business need. This prevents their abuse for persistence (M1042 - Disable or Remove Feature or Program).

Timeline of Events

1
March 12, 2026
Zscaler's ThreatLabz first observed the new Tropic Trooper campaign activity.
2
April 24, 2026
This article was published

MITRE ATT&CK Mitigations

Train users to identify and avoid opening executable files disguised as documents from untrusted sources.

Monitor and potentially block or restrict traffic to developer platforms like GitHub from non-developer workstations.

Mapped D3FEND Techniques:

Use application control to prevent unknown or unauthorized executables from running.

Mapped D3FEND Techniques:

Remove developer tools like VS Code from systems where they are not required to prevent their abuse for persistence.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To counter Tropic Trooper's abuse of legitimate services like GitHub and VS Code, organizations should implement granular outbound traffic filtering and monitoring. It is not feasible to block these services entirely. Instead, create policies that restrict access to them based on user roles and device posture. For example, only allow developer workstations to connect to api.github.com and *.rel.tunnels.api.visualstudio.com. All other systems, especially servers, should be blocked from accessing these domains. Use a web proxy or next-gen firewall that can perform TLS inspection to gain visibility into the API calls being made. Alert on high-frequency API calls to GitHub from a single host or connections to VS Code tunnels from unexpected network segments. This approach significantly narrows the field for threat hunters and can block the C2 and persistence mechanisms used in this campaign.

The initial execution chain of this attack—a PDF reader spawning child processes that make network connections—is highly anomalous and a prime candidate for detection via Process Creation Analysis. Configure EDR or SIEM rules to detect when a common document reader process (like SumatraPDF.exe, AcroRd32.exe, etc.) spawns unexpected child processes like cmd.exe, powershell.exe, or any unsigned binary. Furthermore, correlate this process creation event with subsequent network connections to suspicious domains like the IOC 158.247.193.100 or API endpoints for legitimate services like GitHub. A rule that triggers on SumatraPDF.exe -> [unsigned_loader.exe] -> api.github.com would be a high-fidelity indicator of this specific Tropic Trooper campaign, allowing for immediate automated response like host isolation.

Timeline of Events

1
March 12, 2026

Zscaler's ThreatLabz first observed the new Tropic Trooper campaign activity.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Tropic TrooperAPT23Cyber EspionageGitHubSumatraPDFVS CodeMalware

📢 Share This Article

Help others stay informed about cybersecurity threats