APT37 Adds New Capabilities for Air-Gapped Networks
APT37, a DPRK-backed threat group, has launched a new campaign called Ruby Jumper, utilizing Windows shortcut files to initiate attacks with newly discovered tools. These tools include RESTLEAF, SNAKEDROPPER, THUMBSBD, and VIRUSTASK, which work together to deliver surveillance payloads like FOOTWINE and BLUELIGHT. The campaign leverages removable media to infect and communicate with air-gapped systems. Key features include the use of Ruby for shellcode-based payloads, abuse of cloud storage services for command and control, and sophisticated techniques for bypassing network isolation. The malware demonstrates advanced capabilities in system reconnaissance, data exfiltration, and persistent surveillance.
AI Analysis
Technical Summary
The Ruby Jumper campaign by APT37 represents a significant evolution in attacks against air-gapped networks, which are typically isolated from external networks to prevent cyber intrusions. This campaign uses Windows shortcut (.lnk) files as the initial infection vector, exploiting user interaction with removable media to execute malicious payloads. The threat actor employs a modular toolset including RESTLEAF, SNAKEDROPPER, THUMBSBD, and VIRUSTASK, which collectively facilitate reconnaissance, lateral movement, and persistent backdoor access. Notably, the payloads FOOTWINE and BLUELIGHT are designed for surveillance and data exfiltration. The use of Ruby for shellcode-based payloads is unusual and allows for flexible and stealthy execution. Command and control communications are conducted via abuse of legitimate cloud storage services, circumventing traditional network defenses and enabling control even in isolated environments. The malware also uses advanced techniques such as process injection, credential dumping, and masquerading to evade detection and maintain persistence. This campaign targets air-gapped systems by leveraging removable media to bridge the physical network gap, a method that is difficult to defend against due to the reliance on human factors and physical access. The campaign's sophistication and multi-stage approach indicate a high level of adversary capability and intent to conduct long-term espionage operations.
Potential Impact
Organizations with air-gapped networks, often found in critical infrastructure, government, defense, and high-security research environments, face significant risk from this campaign. Successful compromise can lead to unauthorized surveillance, theft of sensitive intellectual property, and exposure of classified information. The ability to bypass network isolation using removable media and cloud storage for command and control undermines traditional security assumptions about air-gapped environments. Persistent access and advanced evasion techniques increase the difficulty of detection and remediation, potentially allowing prolonged espionage activities. The campaign could disrupt operational integrity and confidentiality, leading to strategic disadvantages, reputational damage, and regulatory consequences. Additionally, the use of cloud services for C2 may implicate third-party providers and complicate incident response efforts. The medium severity rating reflects the complexity of exploitation but acknowledges that initial infection requires physical access or user interaction with removable media, somewhat limiting the attack surface.
Mitigation Recommendations
To mitigate this threat, organizations should implement strict controls on removable media usage, including disabling autorun features and enforcing strict scanning policies with advanced endpoint detection solutions capable of identifying malicious shortcut files and Ruby-based shellcode. Employ application whitelisting to prevent unauthorized execution of unknown binaries and scripts. Network segmentation should be enhanced to monitor and restrict outbound traffic to cloud storage services, using anomaly detection to identify unusual data flows. Implement strong user training focused on the risks of removable media and social engineering attacks. Deploy endpoint detection and response (EDR) tools with capabilities to detect process injection, credential dumping, and masquerading behaviors. Regularly audit and monitor system logs for indicators of compromise related to the identified hashes and domains. Physical security controls should be strengthened to limit unauthorized access to air-gapped systems. Incident response plans must include procedures for handling removable media infections and cloud-based C2 communications. Finally, collaborate with cloud service providers to monitor and block malicious activities leveraging their platforms.
Affected Countries
United States, South Korea, Japan, Germany, United Kingdom, France, Australia, Canada, Israel, Taiwan
Indicators of Compromise
- hash: 098d697f29b94c11b52c51bfe8f9c47d
- hash: 4214818d7cde26ebeb4f35bc2fc29ada
- hash: 476bce9b9a387c5f39461d781e7e22b9
- hash: 57dac5f7d21da2454d0fbefdced80bf3
- hash: 585322a931a49f4e1d78fb0b3f3c6212
- hash: 5c6ff601ccc75e76c2fc99808d8cc9a9
- hash: 709d70239f1e9441e8e21fcacfdc5d08
- hash: ad556f4eb48e7dba6da14444dcce3170
- domain: hightkdhe.store
- domain: homeatedke.store
- domain: philion.store
- domain: www.hightkdhe.store
- domain: www.homeatedke.store
- domain: www.philion.store
APT37 Adds New Capabilities for Air-Gapped Networks
Description
APT37, a DPRK-backed threat group, has launched a new campaign called Ruby Jumper, utilizing Windows shortcut files to initiate attacks with newly discovered tools. These tools include RESTLEAF, SNAKEDROPPER, THUMBSBD, and VIRUSTASK, which work together to deliver surveillance payloads like FOOTWINE and BLUELIGHT. The campaign leverages removable media to infect and communicate with air-gapped systems. Key features include the use of Ruby for shellcode-based payloads, abuse of cloud storage services for command and control, and sophisticated techniques for bypassing network isolation. The malware demonstrates advanced capabilities in system reconnaissance, data exfiltration, and persistent surveillance.
AI-Powered Analysis
Technical Analysis
The Ruby Jumper campaign by APT37 represents a significant evolution in attacks against air-gapped networks, which are typically isolated from external networks to prevent cyber intrusions. This campaign uses Windows shortcut (.lnk) files as the initial infection vector, exploiting user interaction with removable media to execute malicious payloads. The threat actor employs a modular toolset including RESTLEAF, SNAKEDROPPER, THUMBSBD, and VIRUSTASK, which collectively facilitate reconnaissance, lateral movement, and persistent backdoor access. Notably, the payloads FOOTWINE and BLUELIGHT are designed for surveillance and data exfiltration. The use of Ruby for shellcode-based payloads is unusual and allows for flexible and stealthy execution. Command and control communications are conducted via abuse of legitimate cloud storage services, circumventing traditional network defenses and enabling control even in isolated environments. The malware also uses advanced techniques such as process injection, credential dumping, and masquerading to evade detection and maintain persistence. This campaign targets air-gapped systems by leveraging removable media to bridge the physical network gap, a method that is difficult to defend against due to the reliance on human factors and physical access. The campaign's sophistication and multi-stage approach indicate a high level of adversary capability and intent to conduct long-term espionage operations.
Potential Impact
Organizations with air-gapped networks, often found in critical infrastructure, government, defense, and high-security research environments, face significant risk from this campaign. Successful compromise can lead to unauthorized surveillance, theft of sensitive intellectual property, and exposure of classified information. The ability to bypass network isolation using removable media and cloud storage for command and control undermines traditional security assumptions about air-gapped environments. Persistent access and advanced evasion techniques increase the difficulty of detection and remediation, potentially allowing prolonged espionage activities. The campaign could disrupt operational integrity and confidentiality, leading to strategic disadvantages, reputational damage, and regulatory consequences. Additionally, the use of cloud services for C2 may implicate third-party providers and complicate incident response efforts. The medium severity rating reflects the complexity of exploitation but acknowledges that initial infection requires physical access or user interaction with removable media, somewhat limiting the attack surface.
Mitigation Recommendations
To mitigate this threat, organizations should implement strict controls on removable media usage, including disabling autorun features and enforcing strict scanning policies with advanced endpoint detection solutions capable of identifying malicious shortcut files and Ruby-based shellcode. Employ application whitelisting to prevent unauthorized execution of unknown binaries and scripts. Network segmentation should be enhanced to monitor and restrict outbound traffic to cloud storage services, using anomaly detection to identify unusual data flows. Implement strong user training focused on the risks of removable media and social engineering attacks. Deploy endpoint detection and response (EDR) tools with capabilities to detect process injection, credential dumping, and masquerading behaviors. Regularly audit and monitor system logs for indicators of compromise related to the identified hashes and domains. Physical security controls should be strengthened to limit unauthorized access to air-gapped systems. Incident response plans must include procedures for handling removable media infections and cloud-based C2 communications. Finally, collaborate with cloud service providers to monitor and block malicious activities leveraging their platforms.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.zscaler.com/blogs/security-research/apt37-adds-new-capabilities-air-gapped-networks"]
- Adversary
- APT37
- Pulse Id
- 69a06896d797f45ad8da76b0
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash098d697f29b94c11b52c51bfe8f9c47d | — | |
hash4214818d7cde26ebeb4f35bc2fc29ada | — | |
hash476bce9b9a387c5f39461d781e7e22b9 | — | |
hash57dac5f7d21da2454d0fbefdced80bf3 | — | |
hash585322a931a49f4e1d78fb0b3f3c6212 | — | |
hash5c6ff601ccc75e76c2fc99808d8cc9a9 | — | |
hash709d70239f1e9441e8e21fcacfdc5d08 | — | |
hashad556f4eb48e7dba6da14444dcce3170 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainhightkdhe.store | — | |
domainhomeatedke.store | — | |
domainphilion.store | — | |
domainwww.hightkdhe.store | — | |
domainwww.homeatedke.store | — | |
domainwww.philion.store | — |
Threat ID: 69a0ace185912abc71e473ab
Added to database: 2/26/2026, 8:28:17 PM
Last enriched: 2/26/2026, 8:47:53 PM
Last updated: 2/26/2026, 11:46:52 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Disrupting the GRIDTIDE Global Cyber Espionage Campaign
MediumUnmasking Agent Tesla: A Deep Dive into a Multi-Stage Campaign
MediumThe Latest PlugX Variant Executed by STATICPLUGIN
MediumDeveloper-targeting campaign using malicious Next.js repositories
MediumNorth Korean Lazarus Group Now Working With Medusa Ransomware
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.