The North Korean state-sponsored threat group APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima) has been observed deploying a sophisticated new malware toolkit, dubbed 'Ruby Jumper,' to infiltrate and exfiltrate data from air-gapped networks. The campaign, detailed by researchers at Zscaler, leverages removable media as a bridge to cross the physical network isolation. The malware suite, active since at least December 2025, includes several custom tools designed for persistence, surveillance, and data staging, highlighting the group's focus on espionage against high-security targets.
The primary objective of the 'Ruby Jumper' campaign is to steal sensitive information from organizations that rely on air-gapping as a primary security control, such as government, defense, and critical infrastructure sectors. The attack is initiated through social engineering, likely by introducing a compromised USB drive into the target environment. The malware then establishes a foothold, performs reconnaissance, and uses the same USB mechanism as a bidirectional channel to exfiltrate stolen data and receive new commands from its operators.
The attack chain is multi-staged and demonstrates considerable complexity:
LNK file on a removable USB drive. When a user clicks the file, it executes a T1059.001 - PowerShell script.RestLeaf payload in memory. RestLeaf uses the legitimate cloud service Zoho WorkDrive for command-and-control (C2) to fetch a shellcode payload.SnakeDropper, a Windows executable that installs the Ruby 3.3.0 runtime environment, disguising it as a 'USB speed monitoring utility.' It then backdoors the Ruby interpreter to establish persistence.ThumbsBD is dropped. This component monitors for the insertion of USB drives. When a drive is detected, it creates a hidden directory on the device. It stages collected data in this directory for exfiltration and checks for new command files placed there by the attacker, effectively turning the USB drive into a data mule. This is a classic implementation of T1091 - Replication Through Removable Media.FootWine backdoor is deployed. This tool provides the attackers with extensive surveillance capabilities, including file system manipulation, remote shell access, and process/registry management.The use of a legitimate programming language runtime (Ruby) and a public cloud service (Zoho WorkDrive) for C2 are sophisticated evasion tactics designed to blend in with normal activity and bypass simple network-based indicators.
This campaign poses a severe threat to organizations that depend on air gaps for security. A successful breach can lead to the loss of highly sensitive intellectual property, state secrets, or critical operational data. The persistent nature of the backdoors means that even after initial detection, a thorough and complex remediation effort is required to fully eradicate the threat from the isolated network. The incident forces a re-evaluation of security policies around removable media, which are often the weakest link in an air-gapped environment.
Security teams should hunt for the following observables:
| Type | Value | Description |
|---|---|---|
| file_name | *.lnk |
Presence of LNK files on removable media, especially those that execute PowerShell. |
| process_name | powershell.exe |
PowerShell processes spawned by explorer.exe from a removable drive path. |
| url_pattern | *workdrive.zoho.com* |
Network connections to Zoho WorkDrive from systems that do not typically use this service. |
| file_path | C:\ProgramData\USBSpeed\ (example) |
Look for the installation of a Ruby runtime environment in unusual or disguised directory paths. |
| file_name | Thumbs.db (impersonated) |
The ThumbsBD malware may masquerade as legitimate system files in hidden directories on USB drives. |
ThumbsBD.Disabling or strictly controlling USB ports and removable media is the most direct countermeasure to this attack vector.
Mapped D3FEND Techniques:
Using application allowlisting to prevent the execution of unauthorized programs like the rogue Ruby interpreter can break the attack chain.
Mapped D3FEND Techniques:
Logging and auditing PowerShell execution and file access on removable media can provide visibility into this type of activity.
Training users to be suspicious of unknown removable media can prevent the initial execution of the malicious LNK file.
The most effective defense against the 'Ruby Jumper' campaign is to strictly control physical IO ports, specifically USB. In high-security, air-gapped environments, all USB ports should be disabled by default via BIOS/UEFI settings and Group Policy Objects (GPOs). If removable media is a business necessity, implement a solution that only allows company-issued, encrypted, and centrally managed USB devices. Furthermore, establish a secure 'kiosk' or 'sheep dip' station—an isolated system with robust analysis tools—where all external media must be scanned before being introduced into the secure network. This directly disrupts the primary vector for both initial access and data exfiltration used by the ThumbsBD malware component.
Implement a strict application allowlisting policy using a tool like Windows Defender Application Control (WDAC). This policy should deny the execution of all unauthorized applications and scripts by default. In the context of this attack, a properly configured allowlisting policy would prevent the execution of the backdoored Ruby interpreter (ruby.exe) and the initial malicious PowerShell script. Since the attacker disguises the Ruby installation, the policy should be based on cryptographic hashes or publisher certificates, not file names or paths. This breaks the attack chain after the initial LNK file execution, preventing the attacker from establishing persistence and deploying their surveillance backdoors.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats