Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

APT37 Adds New Capabilities for Air-Gapped Networks

0
Medium
Published: Thu Feb 26 2026 (02/26/2026, 15:36:54 UTC)
Source: AlienVault OTX General

Description

APT37, a DPRK-backed threat group, has launched a new campaign called Ruby Jumper, utilizing Windows shortcut files to initiate attacks with newly discovered tools. These tools include RESTLEAF, SNAKEDROPPER, THUMBSBD, and VIRUSTASK, which work together to deliver surveillance payloads like FOOTWINE and BLUELIGHT. The campaign leverages removable media to infect and communicate with air-gapped systems. Key features include the use of Ruby for shellcode-based payloads, abuse of cloud storage services for command and control, and sophisticated techniques for bypassing network isolation. The malware demonstrates advanced capabilities in system reconnaissance, data exfiltration, and persistent surveillance.

AI-Powered Analysis

AILast updated: 02/26/2026, 20:47:53 UTC

Technical Analysis

The Ruby Jumper campaign by APT37 represents a significant evolution in attacks against air-gapped networks, which are typically isolated from external networks to prevent cyber intrusions. This campaign uses Windows shortcut (.lnk) files as the initial infection vector, exploiting user interaction with removable media to execute malicious payloads. The threat actor employs a modular toolset including RESTLEAF, SNAKEDROPPER, THUMBSBD, and VIRUSTASK, which collectively facilitate reconnaissance, lateral movement, and persistent backdoor access. Notably, the payloads FOOTWINE and BLUELIGHT are designed for surveillance and data exfiltration. The use of Ruby for shellcode-based payloads is unusual and allows for flexible and stealthy execution. Command and control communications are conducted via abuse of legitimate cloud storage services, circumventing traditional network defenses and enabling control even in isolated environments. The malware also uses advanced techniques such as process injection, credential dumping, and masquerading to evade detection and maintain persistence. This campaign targets air-gapped systems by leveraging removable media to bridge the physical network gap, a method that is difficult to defend against due to the reliance on human factors and physical access. The campaign's sophistication and multi-stage approach indicate a high level of adversary capability and intent to conduct long-term espionage operations.

Potential Impact

Organizations with air-gapped networks, often found in critical infrastructure, government, defense, and high-security research environments, face significant risk from this campaign. Successful compromise can lead to unauthorized surveillance, theft of sensitive intellectual property, and exposure of classified information. The ability to bypass network isolation using removable media and cloud storage for command and control undermines traditional security assumptions about air-gapped environments. Persistent access and advanced evasion techniques increase the difficulty of detection and remediation, potentially allowing prolonged espionage activities. The campaign could disrupt operational integrity and confidentiality, leading to strategic disadvantages, reputational damage, and regulatory consequences. Additionally, the use of cloud services for C2 may implicate third-party providers and complicate incident response efforts. The medium severity rating reflects the complexity of exploitation but acknowledges that initial infection requires physical access or user interaction with removable media, somewhat limiting the attack surface.

Mitigation Recommendations

To mitigate this threat, organizations should implement strict controls on removable media usage, including disabling autorun features and enforcing strict scanning policies with advanced endpoint detection solutions capable of identifying malicious shortcut files and Ruby-based shellcode. Employ application whitelisting to prevent unauthorized execution of unknown binaries and scripts. Network segmentation should be enhanced to monitor and restrict outbound traffic to cloud storage services, using anomaly detection to identify unusual data flows. Implement strong user training focused on the risks of removable media and social engineering attacks. Deploy endpoint detection and response (EDR) tools with capabilities to detect process injection, credential dumping, and masquerading behaviors. Regularly audit and monitor system logs for indicators of compromise related to the identified hashes and domains. Physical security controls should be strengthened to limit unauthorized access to air-gapped systems. Incident response plans must include procedures for handling removable media infections and cloud-based C2 communications. Finally, collaborate with cloud service providers to monitor and block malicious activities leveraging their platforms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.zscaler.com/blogs/security-research/apt37-adds-new-capabilities-air-gapped-networks"]
Adversary
APT37
Pulse Id
69a06896d797f45ad8da76b0
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash098d697f29b94c11b52c51bfe8f9c47d
hash4214818d7cde26ebeb4f35bc2fc29ada
hash476bce9b9a387c5f39461d781e7e22b9
hash57dac5f7d21da2454d0fbefdced80bf3
hash585322a931a49f4e1d78fb0b3f3c6212
hash5c6ff601ccc75e76c2fc99808d8cc9a9
hash709d70239f1e9441e8e21fcacfdc5d08
hashad556f4eb48e7dba6da14444dcce3170

Domain

ValueDescriptionCopy
domainhightkdhe.store
domainhomeatedke.store
domainphilion.store
domainwww.hightkdhe.store
domainwww.homeatedke.store
domainwww.philion.store

Threat ID: 69a0ace185912abc71e473ab

Added to database: 2/26/2026, 8:28:17 PM

Last enriched: 2/26/2026, 8:47:53 PM

Last updated: 2/26/2026, 11:46:52 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses