State sponsored hackers are now breaking into home internet routers to steal secrets from high profile targets in Japan and beyond.
In a bold shift of tactics, the Chinese cyber group known as Tropic Trooper is moving past office walls to attack people where they live. Security experts at the Black Hat Asia conference in Singapore revealed that this group is now hijacking home Wi-Fi networks to plant spying software. By targeting personal devices, these hackers are bypassing heavy corporate security to reach their victims through the “front door” of their own living rooms.
Hackers Use Home Routers as Secret Gateways
The discovery started with a mystery that felt like a ghost story to digital investigators. A victim thought they were simply updating a common dictionary app on their computer. While the software seemed real, it carried a hidden infection that left no obvious trail. It took a deep dive by researchers at the Japanese firm Itochu Cyber and Intelligence to find the source of the leak.
The hackers did not attack the software company itself. Instead, they broke into the target’s home router and changed the settings. This trick, known as DNS hijacking, sent the victim’s computer to a fake server that looked exactly like the real update site. By controlling the home internet hardware, the hackers could feed the victim malicious files without ever touching a company server.
This new strategy shows that hackers are now viewing the home office as the weakest link in the security chain for government and military officials.

New Tools Discovered in Secret Digital Vaults
While tracking the group, investigators stumbled upon an exposed storage bucket on Amazon’s cloud servers. Inside, they found a treasure trove of 48 different files used for spying. These included fake login pages designed to look like the encrypted messaging app Signal. The hackers use these pages to trick people into giving up their private passwords and access codes.
The group is also moving away from building all their own tools. They are now using open source software that is easily available online. This makes it much harder for security teams to prove who is behind an attack. By mixing custom code with public tools, the group can change their appearance quickly and stay one step ahead of the law.
| Malware Type | Tool Name | Purpose |
| Loader | Donut | Injects code into memory |
| Trojan | Merlin | Remote control of computers |
| Backdoor | C6DOOR | Secret access for hackers |
| Beacon | Cobalt Strike | Signals back to the attackers |
Expanding the Map Across East Asia
Historically, Tropic Trooper focused its energy on Taiwan, Hong Kong, and the Philippines. However, the latest data shows a clear expansion into Japan and South Korea. The group is specifically looking for high profile individuals who hold keys to national secrets or sensitive technology.
This geographical shift suggests a broader mission for the group. They are no longer just looking at local neighbors but are casting a wider net across all of East Asia. By focusing on Chinese speaking individuals living in Japan and Korea, they are finding ways to blend into the digital background.
The group moves fast.
They have shown an ability to completely overhaul their methods in just a few months. This speed makes them one of the most dangerous threats in the region today.
Creative Tactics to Fool the Experts
The group is known for being incredibly creative with how they get into a network. In the past, they have even shown up in person to set up fake Wi-Fi spots near targeted offices. Now, they are using military themed documents to trick people into clicking on bad links.
The rapid change in how these hackers work shows that traditional security at the office is no longer enough to protect sensitive data.
Researchers at Zscaler also found that the group is using common office tools like Visual Studio Code to hide their tracks. By using software that developers and engineers use every day, the hackers can stay hidden on a computer for a long time. They wait, watch, and steal information while looking like a normal part of the computer’s daily operations.
This shift to home based attacks is a wake up call for everyone. When we work from home, our personal routers become part of the front line in a digital war. Keeping your home technology updated is now a matter of national security for many workers in the tech and government sectors.
What do you think about hackers targeting home Wi-Fi to get into work networks? Does this change how you think about your home internet security? Share your thoughts with us and pass this story along to your friends on social media to keep them informed.
