A compromised developer's repository serves as a worm-like infection vector to spread remote access Trojans (RATs) and other malware. This type of attack leverages trusted development infrastructure to distribute malicious code to multiple downstream users and organizations.
30d signal volume
By Threat Layer
Top Signals
View all signals →Campaign targets Chinese-speaking individuals using a trojanized SumatraPDF reader to deploy AdaptixC2 Beacon and facilitate remote access through Microsoft VS Code tunnels. Zscaler ThreatLabz attributed the campaign with high confidence to Tropic Trooper, a known APT group.