{"id":44018,"date":"2026-02-28T02:11:32","date_gmt":"2026-02-27T18:11:32","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/28\/apt37-hackers-use-new-malware-to-breach-air-gapped-networks\/"},"modified":"2026-02-28T02:11:32","modified_gmt":"2026-02-27T18:11:32","slug":"apt37-hackers-use-new-malware-to-breach-air-gapped-networks","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/28\/apt37-hackers-use-new-malware-to-breach-air-gapped-networks\/","title":{"rendered":"APT37 hackers use new malware to breach air-gapped networks"},"content":{"rendered":"\n<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" height=\"900\" src=\"https:\/\/www.bleepstatic.com\/content\/hl-images\/2024\/09\/05\/Airgapped.jpg\" width=\"1600\" alt=\"APT37 hackers use new malware to breach air-gapped networks\"><\/p>\n<p>North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.<\/p>\n<p>The malicious campaign has been named&nbsp;Ruby Jumper and is attributed to the state-backed group APT37, also known as ScarCruft, Ricochet Chollima, and InkySquid.<\/p>\n<p>Air-gapped computers are disconnected from external networks, especially the public internet. Physical isolation is achieved at the hardware level&nbsp;by removing all connectivity (Wi-Fi, Bluetooth, Ethernet), while logical segregation relies on various&nbsp;software-defined controls, like VLANs and firewalls.<\/p>\n<div align=\"center\" style=\"width:98%; margin:0 auto; text-align:center; padding:4px; background:#f0f0f0; border:1px solid #ccc; border-radius:6px;\">  <a href=\"https:\/\/www.wiz.io\/lp\/ai-security-board-report-template?utm_source=bleepingcomputer&amp;utm_medium=display&amp;utm_campaign=FY26Q4_INB_FORM_AI-Security-Board-Report-Template&amp;sfcid=701Vh00000Wn7E1IAJ&amp;utm_term=FY27-bleepingcomputer-article-970x250&amp;utm_content=AI-Board-Report\" rel=\"nofollow noopener\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.bleepstatic.com\/c\/w\/ai-security-board-report-template.jpg\" style=\"margin-top: 0px;\" alt=\"APT37 hackers use new malware to breach air-gapped networks\"><\/a> <\/div>\n<p>In a physical air-gap environment, typical in critical infrastructure, military, and research sectors, data transfer is done through removable storage drives.<\/p>\n<p>Researchers at cloud security company Zscaler&nbsp;analyzed the malware employed in APT37&#8217;s Ruby Jumper campaign and identified a toolkit of&nbsp;five malicious tools: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, and FOOTWINE.<\/p>\n<h3>Bridging the air gap<\/h3>\n<p>The infection chain begins when the victim opens a malicious Windows shortcut file (LNK), which deploys a PowerShell script that extracts payloads embedded in the LNK file.&nbsp;To divert attention, the script also launches a decoy document.<\/p>\n<p>Although the researchers did not specify any victims, they note that the document is an Arabic translation of a North Korean newspaper article about the Palestine-Israel conflict.<\/p>\n<p>The PowerShell script loads the first malware component, called RESTLEAF, an implant that communicates with APT37&#8217;s command-and-control (C2) infrastructure using Zoho WorkDrive.<\/p>\n<p>RESTLEAF fetches encrypted shellcode from the C2 to download the next-stage payload, a Ruby-based loader named SNAKEDROPPER.<\/p>\n<p>The attack continues with installing the&nbsp;Ruby 3.3.0 runtime environment &#8211; complete with the interpreter, standard libraries, and gem infrastructure &#8211; disguised&nbsp;as a legitimate USB-related utility named <em>usbspeed.exe.<\/em><\/p>\n<p>&#8220;SNAKEDROPPER is primed for execution by replacing the RubyGems default file <code>operating_system.rb<\/code> with a maliciously modified version that is automatically loaded when the Ruby interpreter starts,&#8221; via a scheduled task (<em>rubyupdatecheck<\/em>) that executes every five minutes, the researchers say.<\/p>\n<p>The&nbsp;THUMBSBD backdoor is downloaded as a Ruby file named <em>ascii.rb<\/em>, as well as the&nbsp;VIRUSTASK malware as the&nbsp;<em>bundler_index_client.rb<\/em>&nbsp;file.<\/p>\n<p>The role of THUMBSBD is to collect&nbsp;system information, stage&nbsp;command files, and prepare&nbsp;data for exfiltration. Its most crucial function is to create hidden directories on detected USB drives and copy files to them.<\/p>\n<p>According to the researchers, the malware turns removable storage devices &#8220;into a bidirectional covert C2 relay.&#8221; This allows the threat actor to deliver commands to air-gapped systems as well as extract data from them.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"600\" src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/February\/thumbflow.jpg\" width=\"621\" alt=\"APT37 hackers use new malware to breach air-gapped networks\"><figcaption><strong>ThumbSBD execution flow<\/strong><br \/><em>Source: Zscaler<\/em><\/figcaption><\/figure>\n<\/div>\n<p>&ldquo;By leveraging removable media as an intermediary transport layer, the malware bridges otherwise air-gapped network segments,&rdquo; Zscaler <a href=\"http:\/\/threatlabz.zscaler.com\/blogs\/security-research\/apt37-adds-new-capabilities-air-gapped-networks\" target=\"_blank\" rel=\"nofollow noopener\">researchers say<\/a>.<\/p>\n<p>VIRUSTASK&#8217;s role is to spread&nbsp;the infection to new air-gapped machines, weaponizing removable drives by hiding legitimate files and replacing them with malicious shortcuts that execute the embedded Ruby interpreter when opened.<\/p>\n<p>The module will only trigger an infection process if the inserted removable media has at least 2GB of free space.<\/p>\n<div style=\"text-align:center\">\n<figure style=\"display:inline-block\"><img loading=\"lazy\" decoding=\"async\" height=\"600\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apt37-hackers-use-new-malware-to-breach-air-gapped-networks\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" width=\"794\" data-src=\"https:\/\/www.bleepstatic.com\/images\/news\/u\/1220909\/2026\/February\/attack-chain(3).jpg\" alt=\"APT37 hackers use new malware to breach air-gapped networks\"><figcaption><strong>Overview of the Ruby Jumper attack chain<\/strong><br \/><em>Source: Zscaler<\/em><\/figcaption><\/figure>\n<\/div>\n<p>Zscaler reports that THUMBSBD also delivers FOOTWINE, a Windows spyware backdoor disguised as an Android package file (APK) that&nbsp;supports keylogging, screenshot capture, audio and video recording, file manipulation, registry access, and remote shell commands.<\/p>\n<p>Another piece of malware also observed in the APT37&#8217;s RubyJumper campaign is <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-windows-malware-also-steals-data-from-victims-mobile-phones\/\" target=\"_blank\" rel=\"nofollow noopener\">BLUELIGHT<\/a>, a full-fledged backdoor previously associated with the North Korean threat group.<\/p>\n<p>Zscaler has high confidence attributing the RubyJumper campaign to APT37 based on several indicators, including the use of the BLUELIGHT malware, initial vector relying on LNK files, two-stage shellcode delivery technique, and C2 infrastructure typically observed in attacks from this actor.<\/p>\n<p>The researchers also note that the decoy document indicates that the target of the RubyJumper activity is interested in North Korean media narratives, which aligns with the victim profile of this threat group.<\/p>\n<style> .ia_ad {     background-color: #f0f6ff;     width: 95%;     max-width: 800px;     margin: 15px auto;     border-radius: 8px;     border: 1px solid #d6ddee;     display: flex;     align-items: stretch;     padding: 0;     overflow: hidden; }  .ia_lef {     flex: 1;     max-width: 200px;     height: auto;     display: flex;     align-items: stretch; }  .ia_lef a {     display: flex;     width: 100%;     height: 100%; }   .ia_lef a img {     width: 100%;     height: 100%;          border-radius: 8px 0 0 8px;     margin: 0;     display: block; }  .ia_rig {     flex: 2;     padding: 10px;     display: flex;     flex-direction: column;     justify-content: center; }  .ia_rig h2 {     font-size: 17px !important;     font-weight: 700;     color: #333;     line-height: 1.4;     font-family: Georgia, \"Times New Roman\", Times, serif;     margin: 0 0 14px 0; }  .ia_rig p {     font-weight: bold;     font-size: 14px;     margin: 0 0 clamp(6px, 2vw, 14px) 0; }  .ia_button {     background-color: #FFF;     border: 1px solid #3b59aa;     color: black;     text-align: center;     text-decoration: none;     border-radius: 8px;     display: inline-block;     font-size: 16px;     font-weight: bold;     cursor: pointer;     padding: 10px 20px;     width: fit-content; }  .ia_button a {     text-decoration: none;     color: inherit;     display: block; }  @media (max-width: 600px) {     .ia_ad {         flex-direction: column;         align-items: center;     }      .ia_lef {         max-width: 100%;     }      .ia_lef a img {         border-radius: 8px 8px 0 0;     }       .ia_rig {         padding: 15px;         width: 100%;     }      .ia_button {         width: 100%; \tmargin: 0px auto;     } } <\/style>\n<div>\n<div>         <a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">             <img decoding=\"async\" src=\"https:\/\/www.bleepingcomputer.com\/news\/security\/apt37-hackers-use-new-malware-to-breach-air-gapped-networks\/data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-src=\"https:\/\/www.bleepstatic.com\/c\/t\/tines-in-art-square.jpg\" alt=\"APT37 hackers use new malware to breach air-gapped networks\"><\/a>     <\/div>\n<div>\n<h2><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">The future of IT infrastructure is here<\/a><\/h2>\n<p>Modern IT infrastructure moves faster than manual workflows can handle.<\/p>\n<p>In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.<\/p>\n<p>          <button><a href=\"https:\/\/www.tines.com\/access\/guide\/the-future-of-it-infrastructure\/?utm_source=BleepingComputer&amp;utm_medium=paid_media&amp;utm_content=ROS-inarticlebanner-0102\" target=\"_blank\" rel=\"noopener sponsored\">Get the guide<\/a><\/button>     <\/div>\n<\/p><\/div>\n<div>\n<h3>Related Articles:<\/h3>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/north-korean-lazarus-group-linked-to-medusa-ransomware-attacks\/\">North Korean Lazarus group linked to Medusa ransomware attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ukrainian-gets-5-years-for-helping-north-koreans-infiltrate-us-firms\/\">Ukrainian gets 5 years for helping North Koreans infiltrate US firms<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-job-recruiters-hide-malware-in-developer-coding-challenges\/\">Fake job recruiters hide malware in developer coding challenges<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/north-korean-hackers-use-new-macos-malware-in-crypto-theft-attacks\/\">North Korean hackers use new macOS malware in crypto-theft attacks<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/konni-hackers-target-blockchain-engineers-with-ai-built-malware\/\">Konni hackers target blockchain engineers with AI-built malware<\/a><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>North Korean hackers are deploying newly uncovered tool [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-44018","post","type-post","status-publish","format-standard","hentry","category--bleepingcomputer"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/44018","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=44018"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/44018\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=44018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=44018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=44018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}