Diamond Member ThaHaka 0 Posted February 27 Diamond Member Share Posted February 27 This is the hidden content, please Sign In or Sign Up The North Korean threat actor known as ScarCruft has been attributed to a fresh set of tools, including a ********* that uses Zoho WorkDrive for command-and-control (C2) communications to fetch more payloads and an implant that uses removable media to relay commands and breach air-gapped networks. The campaign, codenamed Ruby Jumper by Zscaler ThreatLabz, involves the deployment of malware This is the hidden content, please Sign In or Sign Up 0 Quote Link to comment https://hopzone.eu/forums/topic/302618-h4ckn3wsscarcruft-uses-zoho-workdrive-and-usb-malware-to-breach-air-gapped-networks/ Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.