Image for Article: ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

Article Details

Title
Article: ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
Impact Score
6 / 10
AI Summary (Processed Content)

The North Korean threat actor ScarCruft is using a new campaign called Ruby Jumper, deploying multiple malware families to breach systems and air-gapped networks. The attack chain begins with a malicious LNK file and uses a backdoor named RESTLEAF, which uniquely leverages Zoho WorkDrive for command-and-control communications. Key implants include THUMBSBD and VIRUSTASK, which use removable media to relay commands and data, and FOOTWINE, which provides extensive surveillance capabilities like keylogging and audio/video capture. The main topics covered are a cyber espionage campaign, the specific malware tools and their functions, and the techniques used for infection and command control.

Original URL
https://thehackernews.com/2026/02/scarcruft-uses-zoho-workdrive-and-usb.html
Source Feed
The Hacker News
Published Date
2026-02-27 12:43
Fetched Date
2026-03-04 13:39
Processed Date
2026-03-04 13:58
Embedding Status
Present
Cluster ID
Not Clustered
Raw Extracted Content