Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach

ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach

Posted on February 27, 2026 By CWS

The notorious North Korean cyber group, ScarCruft, has been identified as the force behind a sophisticated cyber campaign using novel tools to infiltrate highly secure networks. Recent findings reveal the use of Zoho WorkDrive for command-and-control (C2) operations, allowing the group to deploy malware even in environments isolated from the internet.

ScarCruft’s New Cyber Tools

Dubbed ‘Ruby Jumper’ by Zscaler ThreatLabz, this campaign employs a series of malware families designed for surveillance and data exfiltration. Among these are RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, FOOTWINE, and BLUELIGHT, each playing a specific role in compromising victims’ systems. The operation was first uncovered by cybersecurity experts in December 2025.

According to Seongsu Park, a security researcher, the attack begins when a victim executes a malicious LNK file. This triggers a PowerShell command that scans the directory to locate the file by size. The PowerShell script then extracts various payloads, including decoy documents and executable files, from the LNK file.

Exploiting Cloud and Removable Storage

The Zoho WorkDrive service is misused for the first time by ScarCruft in these attacks. RESTLEAF, a Windows executable payload, accesses Zoho WorkDrive using a valid token to download and execute additional shellcode. This leads to the deployment of SNAKEDROPPER, which installs the Ruby runtime environment, ensuring persistence with scheduled tasks, and further spreads THUMBSBD and VIRUSTASK.

THUMBSBD is particularly versatile, leveraging removable media to relay commands and move data between connected and isolated systems. This malware can collect system information, download secondary payloads, and execute commands. If removable media is detected, it creates hidden folders to store and execute commands.

Advanced Surveillance Capabilities

One of the payloads, FOOTWINE, is engineered with keylogging and audio-video capture capabilities, communicating with a command server using a custom protocol. This payload supports numerous commands, including shell interaction, file manipulation, and surveillance activities.

Furthermore, THUMBSBD facilitates the distribution of BLUELIGHT, a backdoor associated with ScarCruft since 2021. This malware utilizes popular cloud services like Google Drive and OneDrive for C2 activities, executing commands, and transferring files.

Implications and Future Outlook

The campaign highlights the persistent threat posed by state-sponsored cyber actors like ScarCruft, who continuously evolve their tactics to breach secure networks. By exploiting cloud services and removable media, these actors demonstrate a sophisticated understanding of bypassing security measures.

As these threats continue to grow, organizations must enhance their cybersecurity strategies, particularly in protecting air-gapped and sensitive environments from such advanced threats.

The Hacker News Tags:air-gapped networks, Backdoor, cloud storage, cyber threat, Cybersecurity, Malware, network security, North Korea, Ruby Jumper, ScarCruft, Surveillance, THUMBSBD, USB malware, VIRUSTASK, Zoho WorkDrive

Post navigation

Previous Post: Credential Theft Drives Brute-Force Attacks on SSO Systems
Next Post: 900 FreePBX Systems Compromised by Web Shell Attacks

Related Posts

Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass The Hacker News
OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors The Hacker News
Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure The Hacker News
German Agencies Issue Alert on Signal Phishing Threat German Agencies Issue Alert on Signal Phishing Threat The Hacker News
Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability The Hacker News
Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Resolves SharePoint Zero-Day and 160 More Flaws
  • Earn CPE Credits with SRA’s Purple Team Exercises
  • Critical PHP Composer Vulnerabilities Patched
  • Critical Vulnerability in etcd Allows Unauthorized API Access
  • Adobe Fixes 55 Security Flaws in Multiple Products

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Resolves SharePoint Zero-Day and 160 More Flaws
  • Earn CPE Credits with SRA’s Purple Team Exercises
  • Critical PHP Composer Vulnerabilities Patched
  • Critical Vulnerability in etcd Allows Unauthorized API Access
  • Adobe Fixes 55 Security Flaws in Multiple Products

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark