Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach

ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach

Posted on February 27, 2026 By CWS

The notorious North Korean cyber group, ScarCruft, has been identified as the force behind a sophisticated cyber campaign using novel tools to infiltrate highly secure networks. Recent findings reveal the use of Zoho WorkDrive for command-and-control (C2) operations, allowing the group to deploy malware even in environments isolated from the internet.

ScarCruft’s New Cyber Tools

Dubbed ‘Ruby Jumper’ by Zscaler ThreatLabz, this campaign employs a series of malware families designed for surveillance and data exfiltration. Among these are RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, FOOTWINE, and BLUELIGHT, each playing a specific role in compromising victims’ systems. The operation was first uncovered by cybersecurity experts in December 2025.

According to Seongsu Park, a security researcher, the attack begins when a victim executes a malicious LNK file. This triggers a PowerShell command that scans the directory to locate the file by size. The PowerShell script then extracts various payloads, including decoy documents and executable files, from the LNK file.

Exploiting Cloud and Removable Storage

The Zoho WorkDrive service is misused for the first time by ScarCruft in these attacks. RESTLEAF, a Windows executable payload, accesses Zoho WorkDrive using a valid token to download and execute additional shellcode. This leads to the deployment of SNAKEDROPPER, which installs the Ruby runtime environment, ensuring persistence with scheduled tasks, and further spreads THUMBSBD and VIRUSTASK.

THUMBSBD is particularly versatile, leveraging removable media to relay commands and move data between connected and isolated systems. This malware can collect system information, download secondary payloads, and execute commands. If removable media is detected, it creates hidden folders to store and execute commands.

Advanced Surveillance Capabilities

One of the payloads, FOOTWINE, is engineered with keylogging and audio-video capture capabilities, communicating with a command server using a custom protocol. This payload supports numerous commands, including shell interaction, file manipulation, and surveillance activities.

Furthermore, THUMBSBD facilitates the distribution of BLUELIGHT, a backdoor associated with ScarCruft since 2021. This malware utilizes popular cloud services like Google Drive and OneDrive for C2 activities, executing commands, and transferring files.

Implications and Future Outlook

The campaign highlights the persistent threat posed by state-sponsored cyber actors like ScarCruft, who continuously evolve their tactics to breach secure networks. By exploiting cloud services and removable media, these actors demonstrate a sophisticated understanding of bypassing security measures.

As these threats continue to grow, organizations must enhance their cybersecurity strategies, particularly in protecting air-gapped and sensitive environments from such advanced threats.

The Hacker News Tags:air-gapped networks, Backdoor, cloud storage, cyber threat, Cybersecurity, Malware, network security, North Korea, Ruby Jumper, ScarCruft, Surveillance, THUMBSBD, USB malware, VIRUSTASK, Zoho WorkDrive

Post navigation

Previous Post: Credential Theft Drives Brute-Force Attacks on SSO Systems
Next Post: 900 FreePBX Systems Compromised by Web Shell Attacks

Related Posts

A walkthrough of the Google Workspace Password Manager A walkthrough of the Google Workspace Password Manager The Hacker News
Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict The Hacker News
PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks The Hacker News
Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud Researchers Uncover Service Providers Fueling Industrial-Scale Pig Butchering Fraud The Hacker News
RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories RustFS Flaw, Iranian Ops, WebUI RCE, Cloud Leaks, and 12 More Stories The Hacker News
BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Trump Directs Federal Agencies to Cease Anthropic Technology
  • Aeternum C2: Unstoppable Botnet Leveraging Blockchain
  • DoJ Seizes Tether in Major Crypto Scam Crackdown
  • Dohdoor Malware Targets U.S. Schools and Healthcare
  • Over 900 FreePBX Systems Infected in Web Shell Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Trump Directs Federal Agencies to Cease Anthropic Technology
  • Aeternum C2: Unstoppable Botnet Leveraging Blockchain
  • DoJ Seizes Tether in Major Crypto Scam Crackdown
  • Dohdoor Malware Targets U.S. Schools and Healthcare
  • Over 900 FreePBX Systems Infected in Web Shell Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News