URL has been copied successfully!
ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a backdoor that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands and breach air-gapped networks.The campaign, codenamed Ruby Jumper by Zscaler ThreatLabz, involves the deployment of malware

First seen on thehackernews.com

Jump to article: thehackernews.com/2026/02/scarcruft-uses-zoho-workdrive-and-usb.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link