February 27, 2026 Source: The Hacker News 3 min read · 646 words

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

ScarCruft використовує Zoho WorkDrive та USB-малвер для проникнення в ізольовані мережі

Air-gapped networks aren't supposed to be breachable. That's the whole point. They're isolated. Disconnected. Theoretically impenetrable. And yet, here we are again—security researchers at Zscaler ThreatLabz just documented a live campaign where North Korean threat actor ScarCruft is doing exactly that, using a combination of legitimate cloud services and carefully engineered USB malware to slip past defenses that organizations have spent years building.

This isn't theoretical. This isn't a lab exercise. According to The Hacker News, this is an active operation with real malware tools and documented attack chains.

The real question is: how many organizations know they're already compromised?

What We Know

Zscaler ThreatLabz identified the campaign and documented two novel attack components. The first is a backdoor that abuses Zoho WorkDrive—a legitimate cloud storage and collaboration platform—as a command-and-control infrastructure. The second is purpose-built USB malware designed specifically to bridge the gap between internet-connected networks and isolated systems.

The backdoor piece is particularly clever. By leveraging a trusted, mainstream service like Zoho WorkDrive for C2 communications, ScarCruft avoids the typical signatures and network rules that catch traditional malware callbacks. It's hiding in plain sight. Your firewall sees legitimate cloud traffic. Your analysts see an employee syncing files. Meanwhile, adversaries are exfiltrating data.

Then there's the USB malware component.

This is where the campaign gets asymmetric. Air-gapped networks still have a critical weakness: humans with USB drives. Someone walks from the connected network to the isolated one. They plug in a device. They sync data. And if that USB drive is infected, the air gap collapses.

ScarCruft weaponized this. The USB malware doesn't need internet connectivity. It doesn't need to call home. It simply needs to exist on the isolated network long enough to establish persistence, exfiltrate sensitive data, or lay groundwork for follow-on attacks.

How It Works

The attack chain is methodical. Initial compromise likely occurs on internet-facing systems through phishing, credential compromise, or exploitation—standard ScarCruft tradecraft. Once inside, attackers deploy the Zoho WorkDrive backdoor, establishing a covert communication channel that blends into legitimate business activity.

From there, operators have time. They conduct reconnaissance. They identify which systems have USB access. They craft malicious USB devices tailored to the target environment. And when the moment's right—when someone's moving files between networks—the USB device gets deployed.

Infection happens silently. No alerts. No suspicious network traffic. Just data moving from the air-gapped network to the connected one, where it can be exfiltrated to attacker infrastructure.

Frankly, this was avoidable at multiple points. USB port restrictions. DLP policies. Actually monitoring what leaves air-gapped networks. But those defenses require discipline, and discipline is expensive.

Why It Matters

ScarCruft has historically targeted government, defense, and critical infrastructure sectors. They don't waste time on random targets. If they're deploying tools like this, they're doing it against systems that matter—likely classified networks, weapons systems, defense contractors, or intelligence operations.

The implications are serious. Air-gapped isolation has been a cornerstone of defense-in-depth strategy for decades. If attackers can reliably cross that gap using USB malware, the entire architectural model becomes questionable. You can't just build walls anymore. You have to assume every connection point—including USB drives—is a potential breach vector.

And the Zoho WorkDrive angle? That's a blueprint other threat actors will study. Why burn resources on dedicated C2 infrastructure when you can abuse legitimate services?

Next Steps

Organizations with classified or isolated networks need immediate action. Implement USB port disabling on systems that don't absolutely require it. Deploy endpoint detection and response (EDR) tools that can catch USB-based malware behaviors even if you can't block the devices outright. Review your Zoho WorkDrive logs—not just for suspicious activity, but for what's *not* there. Gaps in legitimate usage patterns can be suspicious too.

Run tabletop exercises. Your incident response plan probably assumes you can disconnect from the internet. But if attackers are already inside your air-gapped network through USB malware, disconnecting won't help.

And have a conversation with your teams about data movement. Because air gaps are only effective if you actually respect them.

Read original article →

// FAQ

Is Zoho WorkDrive compromised or is this a misuse of legitimate features?

Zoho WorkDrive itself isn't compromised—ScarCruft is abusing it legitimately as an attacker-controlled C2 infrastructure after gaining access to compromised accounts. This is a misuse of a trusted service, not a vulnerability in Zoho.

Can air-gapped networks be protected against USB malware?

Yes, through port disabling, read-only USB policies, rigorous USB scanning on isolated systems, and strict USB device management policies. However, complete protection requires accepting that USB is a threat vector and defending accordingly.

What industries or sectors is ScarCruft targeting with these tools?

ScarCruft historically targets government, defense, critical infrastructure, and intelligence sectors. Zscaler's report indicates these tools are being deployed against high-value targets with classified or sensitive isolated networks.

Concerned about your project's security? Run an automated pentest with AISEC — AI-powered scanner with expert verification. Go to dashboard →