
North Korean hackers are deploying newly uncovered instruments to maneuver knowledge between internet-connected and air-gapped methods, unfold through detachable drives, and conduct covert surveillance.
The malicious marketing campaign has been named Ruby Jumper and is attributed to the state-backed group APT37, also referred to as ScarCruft, Ricochet Chollima, and InkySquid.
Air-gapped computer systems are disconnected from exterior networks, particularly the general public web. Bodily isolation is achieved on the {hardware} degree by eradicating all connectivity (Wi-Fi, Bluetooth, Ethernet), whereas logical segregation depends on numerous software-defined controls, like VLANs and firewalls.
In a bodily air-gap atmosphere, typical in essential infrastructure, army, and analysis sectors, knowledge switch is finished by way of detachable storage drives.
Researchers at cloud safety firm Zscaler analyzed the malware employed in APT37’s Ruby Jumper marketing campaign and recognized a toolkit of 5 malicious instruments: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, and FOOTWINE.
Bridging the air hole
The an infection chain begins when the sufferer opens a malicious Home windows shortcut file (LNK), which deploys a PowerShell script that extracts payloads embedded within the LNK file. To divert consideration, the script additionally launches a decoy doc.
Though the researchers didn’t specify any victims, they be aware that the doc is an Arabic translation of a North Korean newspaper article in regards to the Palestine-Israel battle.
The PowerShell script masses the primary malware element, referred to as RESTLEAF, an implant that communicates with APT37’s command-and-control (C2) infrastructure utilizing Zoho WorkDrive.
RESTLEAF fetches encrypted shellcode from the C2 to obtain the next-stage payload, a Ruby-based loader named SNAKEDROPPER.
The assault continues with putting in the Ruby 3.3.0 runtime atmosphere – full with the interpreter, customary libraries, and gem infrastructure – disguised as a legit USB-related utility named usbspeed.exe.
“SNAKEDROPPER is primed for execution by changing the RubyGems default file operating_system.rb with a maliciously modified model that’s mechanically loaded when the Ruby interpreter begins,” through a scheduled process (rubyupdatecheck) that executes each 5 minutes, the researchers say.
The THUMBSBD backdoor is downloaded as a Ruby file named ascii.rb, in addition to the VIRUSTASK malware because the bundler_index_client.rb file.
The position of THUMBSBD is to gather system data, stage command information, and put together knowledge for exfiltration. Its most important operate is to create hidden directories on detected USB drives and duplicate information to them.
In keeping with the researchers, the malware turns detachable storage units “right into a bidirectional covert C2 relay.” This permits the menace actor to ship instructions to air-gapped methods in addition to extract knowledge from them.

Supply: Zscaler
“By leveraging detachable media as an middleman transport layer, the malware bridges in any other case air-gapped community segments,” Zscaler researchers say.
VIRUSTASK’s position is to unfold the an infection to new air-gapped machines, weaponizing detachable drives by hiding legit information and changing them with malicious shortcuts that execute the embedded Ruby interpreter when opened.
The module will solely set off an an infection course of if the inserted detachable media has not less than 2GB of free house.
.jpg)
Supply: Zscaler
Zscaler experiences that THUMBSBD additionally delivers FOOTWINE, a Home windows adware backdoor disguised as an Android bundle file (APK) that helps keylogging, screenshot seize, audio and video recording, file manipulation, registry entry, and distant shell instructions.
One other piece of malware additionally noticed within the APT37’s RubyJumper marketing campaign is BLUELIGHT, a full-fledged backdoor beforehand related to the North Korean menace group.
Zscaler has excessive confidence attributing the RubyJumper marketing campaign to APT37 based mostly on a number of indicators, together with using the BLUELIGHT malware, preliminary vector counting on LNK information, two-stage shellcode supply approach, and C2 infrastructure sometimes noticed in assaults from this actor.
The researchers additionally be aware that the decoy doc signifies that the goal of the RubyJumper exercise is eager about North Korean media narratives, which aligns with the sufferer profile of this menace group.
Trendy IT infrastructure strikes quicker than handbook workflows can deal with.
On this new Tines information, learn the way your workforce can scale back hidden handbook delays, enhance reliability by way of automated response, and construct and scale clever workflows on high of instruments you already use.

