The North Korean state-sponsored threat group APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima) has been observed deploying a sophisticated new malware toolkit, dubbed 'Ruby Jumper,' to infiltrate and exfiltrate data from air-gapped networks. The campaign, detailed by researchers at Zscaler, leverages removable media as a bridge to cross the physical network isolation. The malware suite, active since at least December 2025, includes several custom tools designed for persistence, surveillance, and data staging, highlighting the group's focus on espionage against high-security targets.
The primary objective of the 'Ruby Jumper' campaign is to steal sensitive information from organizations that rely on air-gapping as a primary security control, such as government, defense, and critical infrastructure sectors. The attack is initiated through social engineering, likely by introducing a compromised USB drive into the target environment. The malware then establishes a foothold, performs reconnaissance, and uses the same USB mechanism as a bidirectional channel to exfiltrate stolen data and receive new commands from its operators.
The attack chain is multi-staged and demonstrates considerable complexity:
LNK file on a removable USB drive. When a user clicks the file, it executes a T1059.001 - PowerShell script.RestLeaf payload in memory. RestLeaf uses the legitimate cloud service Zoho WorkDrive for command-and-control (C2) to fetch a shellcode payload.SnakeDropper, a Windows executable that installs the Ruby 3.3.0 runtime environment, disguising it as a 'USB speed monitoring utility.' It then backdoors the Ruby interpreter to establish persistence.ThumbsBD is dropped. This component monitors for the insertion of USB drives. When a drive is detected, it creates a hidden directory on the device. It stages collected data in this directory for exfiltration and checks for new command files placed there by the attacker, effectively turning the USB drive into a data mule. This is a classic implementation of T1091 - Replication Through Removable Media.FootWine backdoor is deployed. This tool provides the attackers with extensive surveillance capabilities, including file system manipulation, remote shell access, and process/registry management.The use of a legitimate programming language runtime (Ruby) and a public cloud service (Zoho WorkDrive) for C2 are sophisticated evasion tactics designed to blend in with normal activity and bypass simple network-based indicators.
This campaign poses a severe threat to organizations that depend on air gaps for security. A successful breach can lead to the loss of highly sensitive intellectual property, state secrets, or critical operational data. The persistent nature of the backdoors means that even after initial detection, a thorough and complex remediation effort is required to fully eradicate the threat from the isolated network. The incident forces a re-evaluation of security policies around removable media, which are often the weakest link in an air-gapped environment.
Security teams should hunt for the following observables:
*.lnkpowershell.exeexplorer.exe from a removable drive path.*workdrive.zoho.com*C:\ProgramData\USBSpeed\ (example)Thumbs.db (impersonated)ThumbsBD malware may masquerade as legitimate system files in hidden directories on USB drives.ThumbsBD.Disabling or strictly controlling USB ports and removable media is the most direct countermeasure to this attack vector.
Mapped D3FEND Techniques:
Using application allowlisting to prevent the execution of unauthorized programs like the rogue Ruby interpreter can break the attack chain.
Mapped D3FEND Techniques:
Logging and auditing PowerShell execution and file access on removable media can provide visibility into this type of activity.
Training users to be suspicious of unknown removable media can prevent the initial execution of the malicious LNK file.
The most effective defense against the 'Ruby Jumper' campaign is to strictly control physical IO ports, specifically USB. In high-security, air-gapped environments, all USB ports should be disabled by default via BIOS/UEFI settings and Group Policy Objects (GPOs). If removable media is a business necessity, implement a solution that only allows company-issued, encrypted, and centrally managed USB devices. Furthermore, establish a secure 'kiosk' or 'sheep dip' station—an isolated system with robust analysis tools—where all external media must be scanned before being introduced into the secure network. This directly disrupts the primary vector for both initial access and data exfiltration used by the ThumbsBD malware component.
Implement a strict application allowlisting policy using a tool like Windows Defender Application Control (WDAC). This policy should deny the execution of all unauthorized applications and scripts by default. In the context of this attack, a properly configured allowlisting policy would prevent the execution of the backdoored Ruby interpreter (ruby.exe) and the initial malicious PowerShell script. Since the attacker disguises the Ruby installation, the policy should be based on cryptographic hashes or publisher certificates, not file names or paths. This breaks the attack chain after the initial LNK file execution, preventing the attacker from establishing persistence and deploying their surveillance backdoors.
The 'Ruby Jumper' campaign is first observed to be active.
Security researchers at Zscaler publish their findings on the campaign.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.