Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Tropic Trooper. Show all posts

Tropic Trooper Expands Operations with Home Router Attacks and New Targets in Asia




A China-linked advanced persistent threat group known as Tropic Trooper is modifying how it operates, introducing unusual attack methods and expanding both its target base and technical toolkit. Recent observations show the group experimenting with new intrusion paths, including an incident where a victim’s personal home Wi-Fi network became the entry point.

The activity was discussed during a session at Black Hat Asia, where researchers explained that the group is no longer limiting itself to conventional enterprise-focused attacks.

Tropic Trooper, also tracked under names such as Pirate Panda, APT23, Bronze Hobart, and Earth Centaur, has been active since at least 2011. Earlier campaigns primarily focused on sectors including government, military, healthcare, transportation, and high-technology organizations located in Taiwan, the Philippines, and Hong Kong. More recently, analysts identified a separate campaign in the Middle East. Current findings now show that the group is directing efforts toward specific individuals in countries such as Japan, South Korea, and Taiwan, indicating that both its geographic reach and victim selection strategy are expanding.

Researchers from Itochu Cyber & Intelligence noted that one defining characteristic of the group is its willingness to rely on unconventional access techniques. In earlier cases, this included placing fake Wi-Fi access points inside targeted office environments. The group is also known for quickly adopting newly available or open-source malware, which allows it to change its attack chains frequently and complicates tracking efforts. Recent investigations conducted alongside Zscaler confirm that these patterns continue, with multiple new tools and creative delivery mechanisms observed.


Compromise Originating from a Home Router

During the conference session titled “Tropic Trooper Reloaded: Unraveling the Invisible Supply Chain Mystery,” researchers Suguru Ishimaru and Satoshi Kamekawa described a case that initially appeared difficult to trace. The infection chain delivered a Cobalt Strike beacon carrying a watermark value “520,” a marker previously associated with Tropic Trooper activity since 2024.

The affected user had downloaded what appeared to be a legitimate update file named youdaodict.exe for a widely used dictionary application. However, the update package contained two small additional files, one of which was an XML file that triggered the infection. At first, investigators could not determine how the software update itself had been altered.

Further analysis revealed that unauthorized changes had been made to the victim’s home router. Nearly a year later, the same system was compromised again using an identical infection process. This prompted a deeper investigation, which uncovered manipulation of DNS settings tied to the software update process.

Although the domain name and application appeared legitimate, the underlying IP address had been redirected. Researchers traced this manipulation back to the home router, where DNS configurations had been modified to point toward an attacker-controlled server. This technique aligns with what is commonly known as an “evil twin” scenario, where legitimate traffic is silently redirected without the user’s awareness.

This case demonstrates that the group is not limiting itself to corporate environments and is willing to exploit personal infrastructure to reach its targets.


Expansion of Malware and Targeting Strategy

The investigation revealed additional infrastructure linked to the group. Researchers identified a publicly accessible Amazon S3 bucket containing 48 files, including new malware samples and phishing pages designed to imitate authentication interfaces for applications such as Signal.

The evidence suggests that Tropic Trooper is focusing on carefully selected individuals, using tailored decoy content in regions including Japan, Taiwan, and South Korea. This represents a change from earlier campaigns that were more organization-centric.

Because the group occasionally reuses IP addresses and file naming patterns, researchers attempted to reconstruct parts of its command-and-control environment through brute-force techniques. This effort led to the discovery of several encrypted payloads stored as .dat files.

After decrypting these files, analysts identified multiple malware components. These included DaveShell and Donut loader, both open-source tools not previously linked to Tropic Trooper. They also identified Merlin Agent and Apollo Agent, which are remote access trojans written in Go and associated with the Mythic command-and-control framework. In addition, a custom backdoor named C6DOOR was found, also developed using the Go programming language.

At the same time, the group continues to deploy previously known tools. These include the EntryShell backdoor, heavily obfuscated variants of the Xiangoop loader, and the previously mentioned Cobalt Strike beacon with the identifiable watermark.


Parallel Campaigns and Delivery Methods

Researchers from Zscaler’s ThreatLabz team reported a related campaign involving a malicious ZIP archive containing documents designed to resemble military-related material. These files were used to lure Chinese-speaking individuals located in Japan and South Korea.

In this campaign, attackers used a modified version of the SumatraPDF application to install an AdaptixC2 beacon. The infection chain eventually resulted in the deployment of Visual Studio Code on compromised systems, likely to support further malicious activity.


Operational Pattern and Security Implications

Taken together, these findings show that Tropic Trooper is rapidly updating its tools and experimenting with different attack paths while extending its reach across multiple regions. Researchers involved in the Black Hat Asia session stated that recent investigations conducted in 2025 revealed several previously unseen malware families, tools, and decoy materials, offering deeper visibility into the group’s activities.

They also observed increased reliance on open-source components within the attack chain. This approach allows the group to modify its methods quickly without relying entirely on custom-built malware.

The pace at which these changes are being introduced demonstrates that the group can adjust its operations within short timeframes, making detection and defense more difficult for targeted organizations and individuals.


China Based Hackers Attack Telco With New Malware


A China-based advanced persistent cyber criminal tracked as UAT-9244 has been attacking telecommunication service providers in South America since 2024. Threat actor attacks Linux, Windows, and network-edge devices. 

Cisco Talos researchers said that the hacker is related to the Tropic Trooper and FamousSparrow hacker groups, but it is tracked as a different activity cluster.

According to the experts, UAT-9244 shares the same victim profile as Salt Typhoon, but they are failing to find a link between the two security clusters.

New malware attacking telco networks

The experts found that the campaign used three previously unknown malware families: PeerTime, a Linux backdoor that employs BitTorrent; TernDoor, a Windows backdoor; and BruteEntry, a brute-force scanner that makes proxy infrastructure (ORBs).

About TernDoor

TernDoor is installed via DLL side-loading through the authentic executable wsprint.exe to deploy malicious code from BugSplatRc64.dll, which decodes and runs the final payload in memory (inserted inside msiexec.exe).

The malware consists of a WSPrint.sys, an embedded Windows driver, which is used for terminating, suspending, and resuming processes.

Persistence is gained through Windows Registry modifications and scheduled tasks, which also hide the scheduled task. Besides this, TernDoor runs commands through a remote shell, executes arbitrary processes, collects system data, reads/writes files, and self-deletes.

About PeerTime

PeerTime is an ELF Linux backdoor that attacks various architectures (MIPS, ARM, AARCH, PPC), hinting that it was made to attack a wide range of embedded systems and network devices.

Cisco Talos found the variants for PeerTime. The first variant is written in C/C++, and the second is based on Rust. The experts also found a Simplified Chinese debug string inside the instrumentor binary, which may be its source. The payload is decoded and installed in memory, and its process is renamed to look real.

About BruteEntry

Lastly, there is BruteEntry, which consists of a brute-forcing component and a Go-based instrumentor binary. Its function is to transform compromised devices into Operational Relay Boxes (ORBs), which are scanning nodes.

The attacker brute-forces SSH, PostgreSQL, and Tomcat by using workstations running BruteEntry to search for new targets. The C2 receives the results of the login attempt along with the task status and notes.

Chinese Hackers Disseminating SMS Bomber Tool with Hidden Malware

 

A threat cluster linked to the Tropic Trooper hacking group has been identified employing previously undocumented malware developed in Nim language to attack targets as part of a newly revealed operation. 

The new loader, codenamed Nimbda, is "bundled with a Chinese language greyware 'SMS Bomber' malware that is most likely illegally circulated through the Chinese-speaking web," according to a report by Israeli cybersecurity firm Check Point. "Whoever crafted the Nim loader took special care to give it the same executable icon as the SMS Bomber that it drops and executes," the researchers said. 

"Therefore the entire bundle works as a trojanized binary." SMS Bomber, as the name implies, allows the user to enter a phone number (not their own) in order to flood the victim's device with messages, perhaps rendering it useless in a denial-of-service (DoS) attack. 

The fact that the binary functions as both an SMS Bomber and a backdoor show that the assaults are not just directed at individuals who use the tool — a "somewhat unorthodox target" — but are also highly targeted. 

Tropic Trooper, also known as Earth Centaur, KeyBoy, and Pirate Panda, has a history of attacking targets in Taiwan, Hong Kong, and the Philippines, especially in the government, healthcare, transportation, and high-tech industries. 

Trend Micro last year referred to the Chinese-speaking collective as particularly clever and well-equipped, highlighting the group's capacity to develop its TTPs to stay under the radar and rely on a wide range of proprietary tools to compromise its targets. 

Check Point's most recent attack chain begins with the tainted SMS Bomber tool, the Nimbda loader, which runs an embedded executable, in this case, the legal SMS bomber payload, while simultaneously injecting a second piece of shellcode into a notepad.exe process. This initiates a three-tier infection process, which includes downloading a next-stage malware from an obfuscated IP address given in a markdown file ("EULA.md") published in an attacker-controlled GitHub or Gitee repository. The retrieved binary is an improved version of the 

Yahoyah trojan, is designed to gather data about local wireless networks in the victim machine's proximity and other system metadata and send it to a command-and-control (C2) server. Yahoyah, for its role, serves as a conduit for the final-stage malware, which is downloaded from the C2 server in the form of an image. The steganographically encoded payload is a backdoor known as TClient, which the group has used in past attacks. 

The researchers concluded, "The observed activity cluster paints a picture of a focused, determined actor with a clear goal in mind."

"Usually, when third-party benign (or benign-appearing) tools are hand-picked to be inserted into an infection chain, they are chosen to be the least conspicuous possible; the choice of an 'SMS Bomber' tool for this purpose is unsettling, and tells a whole story the moment one dares to extrapolate a motive and an intended victim."