radar

ONE Sentinel

securitySecurity/THREATS/HIGH

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

sourceThe Hacker News
calendar_todayFebruary 27, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

ScarCruft Exploits Zoho WorkDrive and USB Malware to Target Air-Gapped Networks

Summary

The North Korean threat actor ScarCruft has developed new tools to breach air-gapped networks, utilizing Zoho WorkDrive for command-and-control (C2) communications and USB malware to relay commands. The campaign, named Ruby Jumper by Zscaler ThreatLabz, highlights sophisticated techniques to infiltrate secure environments.

Key Points

  • ScarCruft is a North Korean threat actor known for advanced cyber-espionage activities.
  • The group uses a backdoor leveraging Zoho WorkDrive for C2 communications.
  • An implant is used to breach air-gapped networks via removable media.
  • The campaign is codenamed Ruby Jumper by Zscaler ThreatLabz.
  • The attack involves fetching additional payloads through Zoho WorkDrive.

Analysis

The use of Zoho WorkDrive for C2 communications demonstrates ScarCruft's ability to exploit legitimate services for malicious purposes, complicating detection and mitigation efforts. The focus on air-gapped networks indicates a high level of sophistication, as these networks are typically isolated from external connections to protect sensitive data. This campaign underscores the evolving tactics of state-sponsored actors in targeting critical infrastructure.

Conclusion

IT professionals should enhance monitoring of network traffic for unusual activities related to legitimate services like Zoho WorkDrive and implement stringent controls on removable media usage to mitigate risks associated with air-gapped network breaches.