North Korea-Linked APT37 Expands into Air-Gapped Networks with “Ruby Jumper”
Air-gapped networks exist for one reason: to keep the most sensitive systems physically separated from the internet. In practice, however, air gaps rarely mean “no connection ever.” Organizations still move files, patches, reports, and logs using removable media and controlled transfer stations. Threat actors who can reliably weaponize that transfer path can turn an air gap into a slow, but functional, two-way bridge. New reporting indicates that North Korea-linked APT37 has expanded its operational capability with a campaign dubbed Ruby Jumper , featuring removable media infection tooling intended to breach or interact with air-gapped systems. This development matters because it shifts the threat model: the attack surface becomes not just endpoints and email, but every controlled transfer workflow and every USB-handling policy across high-security environments. Who is APT37 and why does this shift matter? ...