The security community recently put the magnifying glass back on a North Korean-related group known in the world as ScarCruft or APT37. Zscaler researchers gave a complex and well-worked campaign that they have named "Ruby Jumper" and that, according to the report published in late 2025, combines traditional social engineering techniques with modern tricks: use of legitimate cloud services as a command and control channel and a curious strategy to jump isolated networks by means of removable means.
The attack begins with something that, in appearance, can go unnoticed: a malicious LNK file. When you open it, you run a PowerShell chain that not only tries to persist, but also removes several binaries and scripts embedded within your own direct access. Among these elements is a decoy document - in one case, an article translated into Arabic on the Palestinian conflict - Israel - and several devices that are being activated in a chain to bring the intrusion to ever deeper stages.

One of the most striking components is an executable that researchers called RESTLEAF. This binary is run in memory and, for the first time in the campaigns attributed to this actor, uses Zoho WorkDrive as a C2 mechanism (command and control). RESTLEAF is authenticated with the service using a valid token, download shelcode lodged there and inject it into processes to run later stages without leaving too many traces on the disk.
The use of cloud storage platforms as a C2 vector is not new, but it does draw attention to persistent actors starting to exploit less massive services to pass under the radar. If you want to consult the technical analysis and the evidence published by the discoverers, the Zscaler report is available on your research blog ( Here.), and Zoho WorkDrive's official page helps to understand the service that was used in the attack ( Zoho WorkDrive).
After the initial execution, RESTLEAF deploys a installer to which the researchers called SNAKEDROPPER. This component sets up an autonomous Ruby execution environment in the compromised machine, creates persistence through a scheduled task and drops several modules written in Ruby, including THUMBSBD and VIRUSTASK. The design of that "mini-platform" Ruby allows operators to activate advanced features even in systems that did not have Ruby installed previously.
THUMBSBD is probably the most concerned part of operational security teams. It is presented as a Ruby file and its specialty is the spread and placement of systems connected to the Internet and isolated (air-gapped) equipment by USB drives and other removable means. If you detect the presence of an removable memory, create hidden folders to store commands issued by the operators or to leave results that will then be recovered by a computer connected to the network.
From this position, THUMBSBD can collect system information, download additional charges from remote servers, exfiltration files and execute arbitrary orders. One of the secondary binaries that it installs is FOOTWINE, an encrypted charge that includes a shellcode launcher and surveillance features: key recording, audio and video capture, and communication with a C2 server through a custom binary protocol on TCP. In addition, the campaign also spreads a backdoor known as BLUELIGHT, which has been seen to be linked to this actor for years and which also abuses cloud suppliers (Google Drive, OneDrive, pCloud, BackBlaze) to receive orders and transfer files.
VIRUSTASK, on the other hand, repeats Ruby's pattern and focuses specifically on converting removable units into infection vectors for off-network systems. While THUMBSBD acts as an operating arm (running and exfiltration), VIRUSTASK seeks to maximize the ability of USB memories to enter malware into network segments that, by design, are isolated.
What makes this case clear is the combination of usual methods with modern resources: human decoy (false documents), abuse of Windows's administrative functionality through PowerShell and LNK, the concealment of memory loads and the exploitation of cloud services as legitimate conduits. The result is a chain of attack in several stages designed to be resilient and difficult to eradicate without a coordinated response.
From a defensive point of view, attention should be given to several points: monitoring and analysing the unusual behavior of processes that run PowerShell or manipulate LNK files, monitoring the use of tokens and access to cloud storage APIs, strictly controlling policies and access to removable means and disabling automatic execution where possible. It is also essential that SOC and incident response teams integrate memory and network telemetry detections to identify communications with cloud services that are not common in the organization.

If you want to read a press release summarizing the campaign from the information point of view, specialized media such as BleepingComputer have also covered the finding and amplify the technical conclusions of the report ( additional information on BleepingComputer).
Ruby Jumper reminds us that the attackers combine technical creativity with known tactics to draw defenses.
The recommendation for managers and security officials is not to underestimate the threat posed by removable units and the possibility of cloud services being used as a control gateway by persistent actors. Early detection, network segmentation, proper credentials management and the tightening of implementation policies (especially in workstations with access to external documents) remain key measures to mitigate such campaigns.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...