{ads}

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks



February 27, 2026 at 06:13PM

The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands and breach air-gapped networks. The campaign, codenamed Ruby Jumper by Zscaler ThreatLabz, involves the deployment of malware

from The Hacker News https://ift.tt/sXCqOoQ

0 Response to "ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks"

Post a Comment

Article Top Ads

Central Ads Article 1

Middle Ads Article 2

Article Bottom Ads