ScarCruft Bridges Air-Gapped Networks via Zoho WorkDrive and USB Implants
- Javier Conejo del Cerro
- hace 23 horas
- 3 Min. de lectura

In December 2025, the North Korean threat actor ScarCruft launched a campaign codenamed Ruby Jumper, introducing new tooling that blends cloud abuse and removable media propagation to compromise both internet-connected and air-gapped systems. By leveraging phishing-delivered LNK files, Zoho WorkDrive as command-and-control (C2), and USB-based implants, the group demonstrated a deliberate strategy to bypass network isolation and maintain covert, long-term surveillance.
Phase 1: Initial Access – Phishing and LNK Weaponization
The infection chain begins with spear-phishing emails delivering malicious Windows shortcut (LNK) files. Some lures include Arabic-language decoy documents referencing the Palestine–Israel conflict, translated from North Korean sources to enhance credibility.
When opened, the LNK file launches a PowerShell command that scans its own structure and extracts multiple embedded payloads from fixed offsets. These include:
A decoy document
An executable payload
An additional PowerShell script
A batch file
The staged execution ensures the victim sees legitimate content while the infection silently progresses in memory.
Phase 2: RESTLEAF – Cloud-Based Command and Control
The primary executable payload, RESTLEAF, is launched in memory. This backdoor marks a notable shift: for the first time, ScarCruft abuses Zoho WorkDrive for C2 communications.
Using a valid access token, RESTLEAF authenticates to Zoho’s infrastructure and downloads encrypted shellcode. That shellcode is executed via process injection, minimizing on-disk artifacts and reducing detection surface.
This cloud-based C2 approach provides:
Legitimate traffic blending
Infrastructure resilience
Reduced reliance on attacker-controlled domains
Phase 3: SNAKEDROPPER and Persistence
The next stage deploys SNAKEDROPPER, which installs a self-contained Ruby runtime environment on the victim system. It establishes persistence through scheduled tasks and drops two critical components:
THUMBSBD
VIRUSTASK
This modular design allows ScarCruft to tailor functionality depending on whether the target environment is connected to the internet or physically isolated.
Phase 4: USB-Based Lateral Movement into Air-Gapped Systems
THUMBSBD
Disguised as a Ruby file, THUMBSBD weaponizes removable media to relay commands and exfiltrate data between internet-connected and air-gapped machines.
When removable media is detected, the malware creates hidden directories to:
Stage operator-issued commands
Store execution output
Transfer data between segmented networks
Capabilities include:
System information harvesting
File download and upload
Keystroke logging
Screenshot capture
Audio and video surveillance
Registry modification
DLL loading
Batch execution
Proxy setup for bidirectional traffic relay
THUMBSBD can also deploy FOOTWINE, an encrypted surveillance implant communicating over a custom TCP binary protocol.
VIRUSTASK
While THUMBSBD handles command execution and exfiltration, VIRUSTASK focuses exclusively on propagation. It weaponizes removable media to infect previously untouched air-gapped systems, achieving initial compromise without direct internet connectivity.
Phase 5: BLUELIGHT and Multi-Cloud Abuse
ScarCruft further expands its cloud abuse strategy by deploying BLUELIGHT, a backdoor previously attributed to the group since at least 2021.
BLUELIGHT leverages multiple legitimate cloud providers for C2, including:
Google Drive
Microsoft OneDrive
pCloud
BackBlaze
It supports:
Arbitrary command execution
File system enumeration
Payload download
File upload
Self-removal
This diversification of cloud infrastructure complicates detection and takedown efforts.
Strategic Significance
Ruby Jumper illustrates three important trends:
Legitimate cloud service abuse as primary C2
Modular, memory-resident execution chains
Deliberate bridging of air-gapped environments via USB propagation
ScarCruft is not merely compromising endpoints—it is systematically eroding the security assumption that physical network isolation guarantees protection.
Measures to Fend Off the Attack
Disable or restrict execution of LNK files from untrusted sources
Harden email filtering to detect shortcut-based phishing attachments
Restrict and monitor PowerShell execution and script-block logging
Enforce strict removable media policies and device control solutions
Monitor Zoho WorkDrive and other cloud APIs for anomalous token usage
Detect unexpected Ruby runtime installations and scheduled-task persistence
Flag abnormal keylogging, audio/video capture, DLL loading, and proxy behavior
Apply network segmentation with strict data diodes where possible
Deploy behavioral EDR capable of detecting in-memory shellcode execution
ScarCruft’s Ruby Jumper campaign demonstrates how modern threat actors combine traditional spear-phishing with cloud infrastructure abuse and removable media propagation to defeat network segmentation and air-gap defenses.
By integrating Zoho WorkDrive C2, modular Ruby-based implants, USB command relays, and multi-cloud backdoors, the group showcases operational maturity and long-term espionage intent. The campaign reinforces a critical reality: air-gapped systems are no longer isolated if human behavior and removable media remain uncontrolled.
Organizations relying on physical segmentation as a primary defense must reassess that assumption. In the current threat landscape, isolation without behavioral monitoring and strict device governance is no longer sufficient.
The Hacker News




Comentarios