Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»APT37 hackers use new malware to breach air-gapped networks
    Cybersecurity

    APT37 hackers use new malware to breach air-gapped networks

    adminBy adminFebruary 28, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    APT37 hackers use new malware to breach air-gapped networks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    APT37 hackers use new malware to breach air-gapped networks

    North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.

    The malicious campaign has been named Ruby Jumper and is attributed to the state-backed group APT37, also known as ScarCruft, Ricochet Chollima, and InkySquid.

    Air-gapped computers are disconnected from external networks, especially the public internet. Physical isolation is achieved at the hardware level by removing all connectivity (Wi-Fi, Bluetooth, Ethernet), while logical segregation relies on various software-defined controls, like VLANs and firewalls.

    Wiz

    In a physical air-gap environment, typical in critical infrastructure, military, and research sectors, data transfer is done through removable storage drives.

    Researchers at cloud security company Zscaler analyzed the malware employed in APT37’s Ruby Jumper campaign and identified a toolkit of five malicious tools: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, and FOOTWINE.

    Bridging the air gap

    The infection chain begins when the victim opens a malicious Windows shortcut file (LNK), which deploys a PowerShell script that extracts payloads embedded in the LNK file. To divert attention, the script also launches a decoy document.

    Although the researchers did not specify any victims, they note that the document is an Arabic translation of a North Korean newspaper article about the Palestine-Israel conflict.

    The PowerShell script loads the first malware component, called RESTLEAF, an implant that communicates with APT37’s command-and-control (C2) infrastructure using Zoho WorkDrive.

    RESTLEAF fetches encrypted shellcode from the C2 to download the next-stage payload, a Ruby-based loader named SNAKEDROPPER.

    The attack continues with installing the Ruby 3.3.0 runtime environment – complete with the interpreter, standard libraries, and gem infrastructure – disguised as a legitimate USB-related utility named usbspeed.exe.

    “SNAKEDROPPER is primed for execution by replacing the RubyGems default file operating_system.rb with a maliciously modified version that is automatically loaded when the Ruby interpreter starts,” via a scheduled task (rubyupdatecheck) that executes every five minutes, the researchers say.

    The THUMBSBD backdoor is downloaded as a Ruby file named ascii.rb, as well as the VIRUSTASK malware as the bundler_index_client.rb file.

    The role of THUMBSBD is to collect system information, stage command files, and prepare data for exfiltration. Its most crucial function is to create hidden directories on detected USB drives and copy files to them.

    According to the researchers, the malware turns removable storage devices “into a bidirectional covert C2 relay.” This allows the threat actor to deliver commands to air-gapped systems as well as extract data from them.

    ThumbSBD execution flow
    ThumbSBD execution flow
    Source: Zscaler

    “By leveraging removable media as an intermediary transport layer, the malware bridges otherwise air-gapped network segments,” Zscaler researchers say.

    VIRUSTASK’s role is to spread the infection to new air-gapped machines, weaponizing removable drives by hiding legitimate files and replacing them with malicious shortcuts that execute the embedded Ruby interpreter when opened.

    The module will only trigger an infection process if the inserted removable media has at least 2GB of free space.

    Overview of the attack chain
    Overview of the Ruby Jumper attack chain
    Source: Zscaler

    Zscaler reports that THUMBSBD also delivers FOOTWINE, a Windows spyware backdoor disguised as an Android package file (APK) that supports keylogging, screenshot capture, audio and video recording, file manipulation, registry access, and remote shell commands.

    Another piece of malware also observed in the APT37’s RubyJumper campaign is BLUELIGHT, a full-fledged backdoor previously associated with the North Korean threat group.

    Zscaler has high confidence attributing the RubyJumper campaign to APT37 based on several indicators, including the use of the BLUELIGHT malware, initial vector relying on LNK files, two-stage shellcode delivery technique, and C2 infrastructure typically observed in attacks from this actor.

    The researchers also note that the decoy document indicates that the target of the RubyJumper activity is interested in North Korean media narratives, which aligns with the victim profile of this threat group.


    tines

    Modern IT infrastructure moves faster than manual workflows can handle.

    In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

    AirGapped APT37 Breach hackers Malware networks
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleAndroid 17 could make SIM PIN lock headaches a thing of the past
    Next Article Your Raspberry Pi is probably thermal throttling, and you don’t even know it
    admin
    • Website

    Related Posts

    Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

    March 5, 2026

    Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk

    March 5, 2026

    Mail2Shell zero-click attack lets hackers hijack FreeScout mail servers

    March 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google removes accessibility section from JavaScript SEO section

    March 5, 2026

    Home Assistant 2026.3 has arrived: Here’s what’s new

    March 5, 2026

    Digital sovereignty options for on-prem deployments

    March 5, 2026

    Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

    March 5, 2026
    Categories
    • Blogging (33)
    • Cybersecurity (612)
    • Privacy & Online Earning (91)
    • SEO & Digital Marketing (387)
    • Tech Tools & Mobile / Apps (750)
    • WiFi / Internet & Networking (109)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google removes accessibility section from JavaScript SEO section

    March 5, 2026

    Home Assistant 2026.3 has arrived: Here’s what’s new

    March 5, 2026

    Digital sovereignty options for on-prem deployments

    March 5, 2026
    Most Popular
    • Google removes accessibility section from JavaScript SEO section
    • Home Assistant 2026.3 has arrived: Here’s what’s new
    • Digital sovereignty options for on-prem deployments
    • Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
    • These are the 7 best phones I found at MWC 2026
    • Beazley Exposure Management platform identifies external exposures and prioritizes cyber risk
    • Why Most Enterprise SEO Operating Models Are Structurally Broken
    • Zank Remote – Android, Fire TV 20.3.0 APK Download by zank
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.