Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach

ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach

Posted on February 27, 2026 By CWS

The notorious North Korean cyber group, ScarCruft, has been identified as the force behind a sophisticated cyber campaign using novel tools to infiltrate highly secure networks. Recent findings reveal the use of Zoho WorkDrive for command-and-control (C2) operations, allowing the group to deploy malware even in environments isolated from the internet.

ScarCruft’s New Cyber Tools

Dubbed ‘Ruby Jumper’ by Zscaler ThreatLabz, this campaign employs a series of malware families designed for surveillance and data exfiltration. Among these are RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, FOOTWINE, and BLUELIGHT, each playing a specific role in compromising victims’ systems. The operation was first uncovered by cybersecurity experts in December 2025.

According to Seongsu Park, a security researcher, the attack begins when a victim executes a malicious LNK file. This triggers a PowerShell command that scans the directory to locate the file by size. The PowerShell script then extracts various payloads, including decoy documents and executable files, from the LNK file.

Exploiting Cloud and Removable Storage

The Zoho WorkDrive service is misused for the first time by ScarCruft in these attacks. RESTLEAF, a Windows executable payload, accesses Zoho WorkDrive using a valid token to download and execute additional shellcode. This leads to the deployment of SNAKEDROPPER, which installs the Ruby runtime environment, ensuring persistence with scheduled tasks, and further spreads THUMBSBD and VIRUSTASK.

THUMBSBD is particularly versatile, leveraging removable media to relay commands and move data between connected and isolated systems. This malware can collect system information, download secondary payloads, and execute commands. If removable media is detected, it creates hidden folders to store and execute commands.

Advanced Surveillance Capabilities

One of the payloads, FOOTWINE, is engineered with keylogging and audio-video capture capabilities, communicating with a command server using a custom protocol. This payload supports numerous commands, including shell interaction, file manipulation, and surveillance activities.

Furthermore, THUMBSBD facilitates the distribution of BLUELIGHT, a backdoor associated with ScarCruft since 2021. This malware utilizes popular cloud services like Google Drive and OneDrive for C2 activities, executing commands, and transferring files.

Implications and Future Outlook

The campaign highlights the persistent threat posed by state-sponsored cyber actors like ScarCruft, who continuously evolve their tactics to breach secure networks. By exploiting cloud services and removable media, these actors demonstrate a sophisticated understanding of bypassing security measures.

As these threats continue to grow, organizations must enhance their cybersecurity strategies, particularly in protecting air-gapped and sensitive environments from such advanced threats.

The Hacker News Tags:air-gapped networks, Backdoor, cloud storage, cyber threat, Cybersecurity, Malware, network security, North Korea, Ruby Jumper, ScarCruft, Surveillance, THUMBSBD, USB malware, VIRUSTASK, Zoho WorkDrive

Post navigation

Previous Post: Credential Theft Drives Brute-Force Attacks on SSO Systems
Next Post: 900 FreePBX Systems Compromised by Web Shell Attacks

Related Posts

FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering The Hacker News
CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428 CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428 The Hacker News
Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More The Hacker News
Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa The Hacker News
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now The Hacker News
Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Pentagon Labels Anthropic a Supply Chain Risk Amid AI Dispute
  • Federal Agencies Ordered to Cease Anthropic AI Use
  • Trump Directs Federal Agencies to Cease Anthropic Technology
  • Aeternum C2: Unstoppable Botnet Leveraging Blockchain
  • DoJ Seizes Tether in Major Crypto Scam Crackdown

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Pentagon Labels Anthropic a Supply Chain Risk Amid AI Dispute
  • Federal Agencies Ordered to Cease Anthropic AI Use
  • Trump Directs Federal Agencies to Cease Anthropic Technology
  • Aeternum C2: Unstoppable Botnet Leveraging Blockchain
  • DoJ Seizes Tether in Major Crypto Scam Crackdown

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News