# Tropic Trooper's Trojanized SumatraPDF Campaign Deploys AdaptixC2 to Chinese-Speaking Users
Threat actors use legitimate document reader to distribute advanced C2 beacon; VS Code tunnels leveraged for persistence and remote access
A newly discovered campaign attributed to Tropic Trooper demonstrates a sophisticated supply-chain attack strategy, leveraging a trojanized version of the popular SumatraPDF document reader to deliver the AdaptixC2 Beacon post-exploitation agent. Security researchers at Zscaler ThreatLabz identified the campaign targeting Chinese-speaking users and have attributed it to the APT group with high confidence.
The attack chain represents a notable escalation in operational sophistication, moving beyond traditional malware delivery to abuse legitimate developer tools—specifically Microsoft Visual Studio Code (VS Code) tunnels—for command-and-control (C2) communications and remote access. This approach allows threat actors to blend malicious traffic with legitimate development tool usage, potentially bypassing network detection mechanisms.
## The Threat: Campaign Overview
The campaign operates through a multi-stage infection chain designed to establish persistent remote access on compromised systems:
1. Initial Delivery: Users download what appears to be SumatraPDF, a legitimate, lightweight PDF reader widely used in enterprise and personal environments
2. Trojanized Payload: The compromised version executes a dropper component that deploys AdaptixC2 Beacon
3. C2 Establishment: The beacon communicates with command servers using obfuscated channels
4. Lateral Movement: Threat actors gain persistence through VS Code tunnels, enabling encrypted remote access resistant to traditional security tools
Target Profile: The campaign specifically focuses on Chinese-speaking individuals and organizations, suggesting either:
Zscaler ThreatLabz discovered the campaign in March 2026 through telemetry analysis of uncommon SumatraPDF variants exhibiting suspicious behavior patterns.
## Background and Context: Tropic Trooper's Evolution
Tropic Trooper (also tracked as Pirate Panda, KeyBoy, and Zombie Spider) is a Chinese-speaking threat actor group with a well-documented history spanning over a decade. Key characteristics include:
| Aspect | Details |
|--------|---------|
| Primary Targets | Taiwan, Southeast Asia, Chinese diaspora organizations |
| Attack Vectors | Supply-chain compromises, spear-phishing, watering hole attacks |
| Infrastructure | Primarily based in China; uses VPNs and compromised infrastructure |
| Capabilities | Advanced credential theft, lateral movement, long-term persistence |
| Notable Tools | Gh0stRAT, PlugX, PoisonIvy, Codoso framework |
This campaign reflects Tropic Trooper's documented preference for living-off-the-land techniques—abusing legitimate tools like Windows Management Instrumentation (WMI), PowerShell, and now VS Code to avoid detection. By integrating developer-centric tools into their C2 infrastructure, the group demonstrates increasing sophistication in evading endpoint detection and response (EDR) solutions.
## Technical Details: Attack Chain Breakdown
### Stage 1: Trojanized SumatraPDF Distribution
The compromised SumatraPDF variant is nearly indistinguishable from the legitimate application, containing all expected functionality. However, embedded within the installation package is a dormant payload that activates post-installation.
Delivery Mechanism:
Code Signature Evasion:
### Stage 2: AdaptixC2 Beacon Deployment
Once installed, SumatraPDF executes a secondary payload—the AdaptixC2 Beacon. This post-exploitation agent:
AdaptixC2 is a modular C2 framework, allowing operators to load custom plugins for:
### Stage 3: VS Code Tunnel Persistence
The most notable technical innovation in this campaign is the abuse of VS Code Remote Tunnels—a legitimate feature designed for secure remote development.
How It Works:
1. AdaptixC2 beacon registers a VS Code tunnel using compromised or newly created credentials
2. The tunnel establishes an encrypted connection to Microsoft's relay infrastructure
3. Threat actors connect to the tunnel using legitimate VS Code clients, gaining shell access
4. Communications appear as normal development tool activity in network logs
Why This Approach:
## Implications: Organizational Risk Assessment
This campaign presents multiple threat vectors for organizations:
### Immediate Risk Vectors
Developer Communities: The targeting of developer-focused tools suggests elevated risk for:
Supply Chain Risk: Organizations distributing SumatraPDF or bundling it with other tools could inadvertently distribute the trojanized version, extending the attack surface exponentially.
Credential Harvesting: AdaptixC2's focus on credential extraction represents a significant risk for organizations lacking robust secrets management:
### Detection Challenges
Traditional security detection mechanisms struggle with this attack pattern:
## Recommendations: Defensive Strategies
### Immediate Actions (0-7 Days)
1. Audit SumatraPDF Installations: Inventory all instances of SumatraPDF across your infrastructure using endpoint management tools
- Verify installation source and digital signature validity
- Check installed version against official release history
2. Review VS Code Tunnel Usage: Examine all active VS Code tunnels in your organization
- List registered tunnels: code tunnel list on managed systems
- Disable unnecessary tunnels and rotate authentication tokens
- Implement tunnel access logging and monitoring
3. Threat Hunting: Search for indicators of compromise (IOCs):
- Suspicious AdaptixC2 process behavior patterns
- Unusual PowerShell or command-line execution from PDF readers
- Network connections to known C2 infrastructure
### Medium-Term Actions (1-4 Weeks)
1. Update Software Distribution Policies:
- Implement application allowlisting, restricting SumatraPDF to official sources
- Deploy software as managed packages through centralized repositories
- Establish signature validation before installation
2. Enhance Credential Protection:
- Require multi-factor authentication (MFA) for all developer accounts
- Implement privileged access management (PAM) for administrative credentials
- Deploy credential guard or similar OS-level secrets protection
3. Network Segmentation:
- Restrict VS Code tunnel traffic to authorized networks
- Implement conditional access policies for VS Code tunnels based on device posture
- Monitor and log all tunnel connection attempts
### Long-Term Resilience (1-3 Months)
1. Security Awareness Training: Educate development teams on:
- Supply-chain attack risks and software verification procedures
- Phishing and social engineering targeting developer communities
- Secure credential handling and secrets management
2. Monitoring and Detection:
- Deploy behavioral analytics to detect anomalous VS Code tunnel usage
- Establish baseline network profiles for development tool traffic
- Configure alerts for out-of-hours access or unusual geographic connections
3. Incident Response Planning:
- Develop specific playbooks for developer credential compromise scenarios
- Establish rapid credential rotation procedures for high-risk accounts
- Plan containment strategies that minimize disruption to legitimate development work
## Conclusion
The Tropic Trooper campaign targeting Chinese-speaking users through trojanized SumatraPDF represents a sophisticated evolution in APT tradecraft. By combining supply-chain compromise with abuse of legitimate developer tools, the group has developed an attack pattern that is both effective and difficult to detect.
Organizations must treat this as a wake-up call regarding the security posture of development environments. Developers and their tools have historically received less security scrutiny than traditional endpoints—a gap that sophisticated threat actors are actively exploiting. By implementing the recommended detection and prevention measures, organizations can significantly reduce their exposure to this and similar threats.
The use of VS Code tunnels particularly warrants attention, as the feature represents a new category of legitimate-tool abuse that security teams must learn to monitor and defend against effectively.