ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

Published: (February 27, 2026 at 07:43 AM EST)
1 min read

Source: The Hacker News

Summary

The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command‑and‑control (C2) communications to fetch additional payloads, and an implant that leverages removable media to relay commands and breach air‑gapped networks.

The campaign, codenamed Ruby Jumper by Zscaler ThreatLabz, involves the deployment of malware.

0 views
Back to Blog

Related posts

Read more »