By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
Computing

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

News Room
Last updated: 2026/02/27 at 8:14 AM
News Room Published 27 February 2026
Share
ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
SHARE

Ravie LakshmananFeb 27, 2026Malware / Surveillance

The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands and breach air-gapped networks.

The campaign, codenamed Ruby Jumper by Zscaler ThreatLabz, involves the deployment of malware families, such as RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, FOOTWINE, and BLUELIGHT to facilitate surveillance on a victim’s system. It was discovered by the cybersecurity company in December 2025.

“In the Ruby Jumper campaign, when a victim opens a malicious LNK file, it launches a PowerShell command and scans the current directory to locate itself based on file size,” security researcher Seongsu Park said. “Then, the PowerShell script launched by the LNK file carves multiple embedded payloads from fixed offsets within that LNK, including a decoy document, an executable payload, an additional PowerShell script, and a batch file.”

One of the lure documents used in the campaign displays an article about the Palestine-Israel conflict that’s translated from a North Korean newspaper into Arabic.

All three remaining payloads are used to progressively move the attack to the next stage, with the batch script launching PowerShell, which, in turn, is responsible for loading shellcode containing the payload after decrypting it. The Windows executable payload, named RESTLEAF, is spawned in memory, and uses Zoho WorkDrive for C2, marking the first time the threat actor has abused the cloud storage service in its attack campaigns.

Once it’s successfully authenticated with the Zoho WorkDrive infrastructure by means of a valid access token, RESTLEAF downloads shellcode, which is then executed via process injection, eventually leading to the deployment of SNAKEDROPPER, which installs the Ruby runtime, sets up persistence using a scheduled task, and drops THUMBSBD and VIRUSTASK.

THUMBSBD, which is disguised as a Ruby file and uses removable media to relay commands and transfer data between internet-connected and air-gapped systems. It’s capable of harvesting system information, downloading a secondary payload from a remote server, exfiltrating files, and executing arbitrary commands. If the presence of any removable media is detected, the malware creates a hidden folder and uses it to stage operator-issued commands or store execution output.

One of the payloads delivered by THUMBSBD is FOOTWINE, an encrypted payload with an integrated shellcode launcher that comes fitted with keylogging and audio and video capturing capabilities to conduct surveillance. It communicates with a C2 server using a custom binary protocol over TCP. The complete set of commands supported by the malware is as follows –

  • sm, for interactive command shell
  • fm, for file and directory manipulation
  • gm, for managing plugins and configuration
  • rm, for modifying the Windows Registry
  • pm, for enumerating running processes
  • dm, for taking screenshots and captures keystrokes
  • cm, for performing audio and video surveillance
  • s_d, for receiving batch script contents from C2 server, saving it to the file %TEMP%SSMMHH_DDMMYYYY.bat, and executing it
  • pxm, for setting up a proxy connection and relaying traffic bidirectionally.
  • [filepath], for loading a given DLL

THUMBSBD is also designed to distribute BLUELIGHT, a backdoor previously attributed to ScarCruft since at least 2021. The malware weaponizes legitimate cloud providers, including Google Drive, Microsoft OneDrive, pCloud, and BackBlaze, for C2 to run arbitrary commands, enumerate the file system, download additional payloads, upload files, and remove itself.

Also delivered as a Ruby file, VIRUSTASK functions similar to THUMBSBD in that it acts as a removable media propagation component to spread the malware to non-infected air-gapped systems. “Unlike THUMBSBD which handles command execution and exfiltration, VIRUSTASK focuses exclusively on weaponizing removable media to achieve initial access on air-gapped systems,” Park explained.

“The Ruby Jumper campaign involves a mult-stage infection chain that begins with a malicious LNK file and utilizes legitimate cloud services (like Zoho WorkDrive, Google Drive, Microsoft OneDrive, etc.) to deploy a novel, self-contained Ruby execution environment,” Park said. “Most critically, THUMBSBD and VIRUSTASK weaponize removable media to bypass network isolation and infect air-gapped systems.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Kubernetes Introduces Node Readiness Controller to Improve Pod Scheduling Reliability Kubernetes Introduces Node Readiness Controller to Improve Pod Scheduling Reliability
Next Article Apple Asks Judge to Toss Fraud Claims Over Siri AI, Epic Compliance Apple Asks Judge to Toss Fraud Claims Over Siri AI, Epic Compliance
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

4 Unique Uses For Your Old Nintendo Wii U – BGR
4 Unique Uses For Your Old Nintendo Wii U – BGR
News
MWC 2026 updates: Phones, foldables, robots, and all the tech we expect to see
MWC 2026 updates: Phones, foldables, robots, and all the tech we expect to see
Gadget
The Synthesis Organization: Leadership and Governance in a Multi-Agent World
The Synthesis Organization: Leadership and Governance in a Multi-Agent World
Gadget
Cambricon posts 3 million revenue in first half of 2025, up 4,348% y-o-y · TechNode
Cambricon posts $403 million revenue in first half of 2025, up 4,348% y-o-y · TechNode
Computing

You Might also Like

Cambricon posts 3 million revenue in first half of 2025, up 4,348% y-o-y · TechNode
Computing

Cambricon posts $403 million revenue in first half of 2025, up 4,348% y-o-y · TechNode

1 Min Read
BYD ships Thailand-made EVs to Europe for first time · TechNode
Computing

BYD ships Thailand-made EVs to Europe for first time · TechNode

1 Min Read
AI-Native Automation in 5G-Advanced and 6G | HackerNoon
Computing

AI-Native Automation in 5G-Advanced and 6G | HackerNoon

6 Min Read
Xpeng’s redesigned sedan boasts highest computing power in the world · TechNode
Computing

Xpeng’s redesigned sedan boasts highest computing power in the world · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?