The advanced persistent threat (APT) group Tropic Trooper (also known as APT23, Pirate Panda) has been attributed to a new cyber-espionage campaign observed in March 2026. Researchers at Zscaler's ThreatLabz report with high confidence that the group is targeting Chinese-speaking individuals, likely in Taiwan, South Korea, and Japan, with military-themed lures. The attack chain begins with a trojanized version of the legitimate SumatraPDF reader. When executed, it deploys a custom post-exploitation agent called AdaptixC2 Beacon. In a novel command-and-control (C2) tactic, this beacon uses GitHub's API to receive commands and exfiltrate data, hiding its traffic within legitimate developer activity. For persistent access to high-value targets, the group was also observed using Microsoft Visual Studio Code tunnels. The campaign leverages a complex toolset including a loader named TOSHIS and a backdoor called EntryShell, reinforcing the attribution to Tropic Trooper.
Threat Actor: Tropic Trooper (APT23, Earth Centaur, KeyBoy, Pirate Panda)
Targets: Chinese-speaking individuals and organizations, with a focus on Taiwan, South Korea, and Japan.
Malware: AdaptixC2 Beacon, TOSHIS (loader, variant of Xiangoop), EntryShell (backdoor), Cobalt Strike Beacon.
Infrastructure: 158.247.193.100 (staging server), GitHub repositories (for C2).
Primary Goal: Cyber espionage and long-term intelligence gathering.
The campaign demonstrates Tropic Trooper's continued evolution, incorporating living-off-the-land techniques and abusing legitimate services to evade detection. The use of military-themed documents suggests a focus on government, defense, or political targets.
The attack is multi-staged and relies on social engineering to initiate.
T1204.002 - Malicious File) The victim receives a ZIP archive with a lure document, such as Comparative Analysis of US-UK and US-Australia Nuclear Submarine Cooperation (2025).exe. This executable is a trojanized version of SumatraPDF.T1140 - Deobfuscate/Decode Files or Information) Upon execution, the legitimate PDF reader displays a decoy document. In the background, it runs a loader called TOSHIS. TOSHIS connects to a staging server (158.247.193.100) to download an encrypted shellcode.T1102.002 - Bidirectional Communication) The AdaptixC2 Beacon uses the GitHub API to communicate. It reads commands from GitHub issues and exfiltrates data by posting to the repository, effectively using GitHub as its C2 server.T1105 - Ingress Tool Transfer) For high-value targets, the actors deploy Microsoft Visual Studio Code and establish a VS Code tunnel. This provides them with persistent, encrypted remote access that blends in with legitimate remote development or administration traffic.The staging server was also found hosting a Cobalt Strike Beacon and a custom backdoor named EntryShell, tools previously associated with Tropic Trooper.
The impact of this campaign is primarily espionage-related. By gaining persistent access to the systems of individuals in government, policy, or defense circles, Tropic Trooper can exfiltrate sensitive documents, monitor communications, and gather long-term intelligence. The use of VS Code tunnels provides a stealthy and resilient foothold within a target network, making eviction difficult. While not directly destructive, the loss of confidential strategic, political, or military information can have significant national security implications for the targeted countries. The abuse of trusted platforms like GitHub and VS Code for malicious purposes also makes detection harder for network defenders, as blocking these services is often not feasible.
158.247.193.100Comparative Analysis of US-UK and US-Australia Nuclear Submarine Cooperation (2025).exeSecurity teams may want to hunt for the following patterns to detect this activity:
api.github.com/repos/{user}/{repo}/issuescode.execode tunnel*.rel.tunnels.api.visualstudio.comapi.github.com. While legitimate, traffic from non-developer tools or suspicious processes should be investigated. Use URL Analysis to inspect the full API path for suspicious repository names.code tunnel command line.D3-EAL: Executable Allowlisting) to prevent the execution of unauthorized applications like the trojanized SumatraPDF.exe.M1017 - User Training).M1021 - Restrict Web-Based Content).M1042 - Disable or Remove Feature or Program).Train users to identify and avoid opening executable files disguised as documents from untrusted sources.
Monitor and potentially block or restrict traffic to developer platforms like GitHub from non-developer workstations.
Mapped D3FEND Techniques:
Use application control to prevent unknown or unauthorized executables from running.
Remove developer tools like VS Code from systems where they are not required to prevent their abuse for persistence.
Mapped D3FEND Techniques:
To counter Tropic Trooper's abuse of legitimate services like GitHub and VS Code, organizations should implement granular outbound traffic filtering and monitoring. It is not feasible to block these services entirely. Instead, create policies that restrict access to them based on user roles and device posture. For example, only allow developer workstations to connect to api.github.com and *.rel.tunnels.api.visualstudio.com. All other systems, especially servers, should be blocked from accessing these domains. Use a web proxy or next-gen firewall that can perform TLS inspection to gain visibility into the API calls being made. Alert on high-frequency API calls to GitHub from a single host or connections to VS Code tunnels from unexpected network segments. This approach significantly narrows the field for threat hunters and can block the C2 and persistence mechanisms used in this campaign.
The initial execution chain of this attack—a PDF reader spawning child processes that make network connections—is highly anomalous and a prime candidate for detection via Process Creation Analysis. Configure EDR or SIEM rules to detect when a common document reader process (like SumatraPDF.exe, AcroRd32.exe, etc.) spawns unexpected child processes like cmd.exe, powershell.exe, or any unsigned binary. Furthermore, correlate this process creation event with subsequent network connections to suspicious domains like the IOC 158.247.193.100 or API endpoints for legitimate services like GitHub. A rule that triggers on SumatraPDF.exe -> [unsigned_loader.exe] -> api.github.com would be a high-fidelity indicator of this specific Tropic Trooper campaign, allowing for immediate automated response like host isolation.
Zscaler's ThreatLabz first observed the new Tropic Trooper campaign activity.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats