APT37 hackers use new malware to breach air-gapped networks
嗯,用户让我用中文总结一篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我需要理解文章内容。文章讲的是朝鲜黑客组织APT37使用名为Ruby Jumper的新工具,通过U盘在断网和联网系统之间传输数据,并进行间谍活动。 接下来,我要提取关键信息:APT37、Ruby Jumper、U盘传播、间谍活动、数据转移。然后,把这些信息浓缩成一句话,不超过100字。同时,要确保语言简洁明了,不使用复杂的术语。 可能会遇到的问题是信息太多,难以精简。比如文章提到了多个恶意软件工具和攻击链的细节,但这些可能不需要全部包含在内。重点在于描述攻击的主要手段和目标。 最后,检查字数是否符合要求,并确保没有遗漏关键点。这样就能提供一个准确且简洁的总结。 </think> 朝鲜黑客组织APT37利用名为"Ruby Jumper"的新恶意软件工具,在断网与联网系统间通过U盘传播间谍程序并窃取数据。 2026-2-27 19:30:17 Author: www.bleepingcomputer.com(查看原文) 阅读量:5 收藏

APT37 hackers use new malware to breach air-gapped networks

North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance.

The malicious campaign has been named Ruby Jumper and is attributed to the state-backed group APT37, also known as ScarCruft, Ricochet Chollima, and InkySquid.

Air-gapped computers are disconnected from external networks, especially the public internet. Physical isolation is achieved at the hardware level by removing all connectivity (Wi-Fi, Bluetooth, Ethernet), while logical segregation relies on various software-defined controls, like VLANs and firewalls.

Wiz

In a physical air-gap environment, typical in critical infrastructure, military, and research sectors, data transfer is done through removable storage drives.

Researchers at cloud security company Zscaler analyzed the malware employed in APT37's Ruby Jumper campaign and identified a toolkit of five malicious tools: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, and FOOTWINE.

Bridging the air gap

The infection chain begins when the victim opens a malicious Windows shortcut file (LNK), which deploys a PowerShell script that extracts payloads embedded in the LNK file. To divert attention, the script also launches a decoy document.

Although the researchers did not specify any victims, they note that the document is an Arabic translation of a North Korean newspaper article about the Palestine-Israel conflict.

The PowerShell script loads the first malware component, called RESTLEAF, an implant that communicates with APT37's command-and-control (C2) infrastructure using Zoho WorkDrive.

RESTLEAF fetches encrypted shellcode from the C2 to download the next-stage payload, a Ruby-based loader named SNAKEDROPPER.

The attack continues with installing the Ruby 3.3.0 runtime environment - complete with the interpreter, standard libraries, and gem infrastructure - disguised as a legitimate USB-related utility named usbspeed.exe.

"SNAKEDROPPER is primed for execution by replacing the RubyGems default file operating_system.rb with a maliciously modified version that is automatically loaded when the Ruby interpreter starts," via a scheduled task (rubyupdatecheck) that executes every five minutes, the researchers say.

The THUMBSBD backdoor is downloaded as a Ruby file named ascii.rb, as well as the VIRUSTASK malware as the bundler_index_client.rb file.

The role of THUMBSBD is to collect system information, stage command files, and prepare data for exfiltration. Its most crucial function is to create hidden directories on detected USB drives and copy files to them.

According to the researchers, the malware turns removable storage devices "into a bidirectional covert C2 relay." This allows the threat actor to deliver commands to air-gapped systems as well as extract data from them.

ThumbSBD execution flow
ThumbSBD execution flow
Source: Zscaler

“By leveraging removable media as an intermediary transport layer, the malware bridges otherwise air-gapped network segments,” Zscaler researchers say.

VIRUSTASK's role is to spread the infection to new air-gapped machines, weaponizing removable drives by hiding legitimate files and replacing them with malicious shortcuts that execute the embedded Ruby interpreter when opened.

The module will only trigger an infection process if the inserted removable media has at least 2GB of free space.

Overview of the attack chain
Overview of the Ruby Jumper attack chain
Source: Zscaler

Zscaler reports that THUMBSBD also delivers FOOTWINE, a Windows spyware backdoor disguised as an Android package file (APK) that supports keylogging, screenshot capture, audio and video recording, file manipulation, registry access, and remote shell commands.

Another piece of malware also observed in the APT37's RubyJumper campaign is BLUELIGHT, a full-fledged backdoor previously associated with the North Korean threat group.

Zscaler has high confidence attributing the RubyJumper campaign to APT37 based on several indicators, including the use of the BLUELIGHT malware, initial vector relying on LNK files, two-stage shellcode delivery technique, and C2 infrastructure typically observed in attacks from this actor.

The researchers also note that the decoy document indicates that the target of the RubyJumper activity is interested in North Korean media narratives, which aligns with the victim profile of this threat group.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/
如有侵权请联系:admin#unsafe.sh