Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
North Korean APT37’s New Tools Target Air-Gapped Systems

North Korean APT37’s New Tools Target Air-Gapped Systems

Posted on March 2, 2026 By CWS

North Korean cyber threat group APT37, also known by aliases such as ScarCruft, Ruby Sleet, and Velvet Chollima, has been identified utilizing a suite of new malicious tools to infiltrate air-gapped systems, according to a report by Zscaler. Operating since 2012, APT37 focuses primarily on data theft and surveillance, with a primary target being South Korean entities.

APT37’s New Campaign: Ruby Jumper

In December 2025, a campaign dubbed ‘Ruby Jumper’ was uncovered, showcasing APT37’s use of LNK files to initiate a PowerShell script. This script deploys several payloads, including a decoy document in Arabic discussing the Palestine-Israel conflict. These payloads cooperate to execute an in-memory payload named RestLeaf, which leverages Zoho WorkDrive cloud storage for command and control operations.

RestLeaf retrieves a file containing shellcode, which acts as a launcher. This launcher decrypts a second-stage shellcode, loading an embedded Windows executable called SnakeDropper. The malware installs a Ruby 3.3.0 runtime environment disguised as a USB speed monitoring utility, creating a persistent threat through backdoors and scheduled tasks.

Techniques for Infiltrating Air-Gapped Systems

SnakeDropper further deploys ThumbsBD, a backdoor designed to exfiltrate data from air-gapped systems via removable drives. Upon detecting USB drives, it creates a hidden directory in their root folder to stage backdoor commands and facilitate data exfiltration. ThumbsBD is also capable of downloading additional payloads and executing shellcode from a specific directory.

The campaign also includes VirusTask, a tool for media propagation. VirusTask is tailored to infect air-gapped systems by weaponizing USB drives, copying payload executables, and replacing files with LNK shortcuts that execute shellcode. This method ensures the malware’s spread through social engineering tactics, as users are likely to open seemingly legitimate files.

Implications for Cybersecurity

To enhance its surveillance capabilities, APT37’s toolkit includes FootWine, an Android package that serves as a shellcode launcher with features like keystroke logging and audiovisual capture. It supports various commands for file and process manipulation. Zscaler emphasizes the need for the security community to monitor endpoint activity and physical access points to deter threats posed by APT37 and similar actors.

This campaign highlights the sophisticated techniques employed by North Korean cyber actors to breach network isolations and infiltrate secure systems. Continuous vigilance and robust security measures are critical to protecting sensitive information and infrastructure from such advanced persistent threats.

Security Week News Tags:air-gapped systems, APT37, cyber attack, cyber threats, Cybersecurity, data exfiltration, Malware, North Korea, Ruby Jumper, Surveillance

Post navigation

Previous Post: Critical Angular SSR Flaw Exposes Unauthorized Requests
Next Post: Unencrypted TPMS in Major Cars Pose Privacy Risks

Related Posts

Ransomware Group Claims Attack on Beer Giant Asahi Ransomware Group Claims Attack on Beer Giant Asahi Security Week News
Cellcom Service Disruption Caused by Cyberattack Cellcom Service Disruption Caused by Cyberattack Security Week News
Critical King Addons Vulnerability Exploited to Hack WordPress Sites Critical King Addons Vulnerability Exploited to Hack WordPress Sites Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact Security Week News
Data Exposure Vulnerability Found in Deep Learning Tool Keras Data Exposure Vulnerability Found in Deep Learning Tool Keras Security Week News
UK Imposes M Fine on Reddit for Child Data Breaches UK Imposes $20M Fine on Reddit for Child Data Breaches Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chrome’s AI Assistant Vulnerability Patched to Prevent Risks
  • OCRFix Botnet Trojan Uses Blockchain for Stealth Operations
  • OpenClaw Flaw Could Allow AI Takeover via Malicious Sites
  • Critical SD-WAN Vulnerability and AI Threats Emerge
  • Widespread SonicWall Firewall Attacks Exploiting Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chrome’s AI Assistant Vulnerability Patched to Prevent Risks
  • OCRFix Botnet Trojan Uses Blockchain for Stealth Operations
  • OpenClaw Flaw Could Allow AI Takeover via Malicious Sites
  • Critical SD-WAN Vulnerability and AI Threats Emerge
  • Widespread SonicWall Firewall Attacks Exploiting Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News