Home OSINT News Signals
CYBER2026-02-27

APT37 hackers use new malware to breach air-gapped networks

A sophisticated hacking group, known as APT37, has deployed a novel strain of malware capable of breaching the most secure air-gapped networks, according to a new report from cybersecurity firm Sentinel Labs. The discovery highlights an alarming escalation in the tools available to state-sponsored threat actors.

Air-gapped networks are physically isolated from the public internet, making them the last line of defense for critical infrastructure, military systems, and sensitive financial data. The new malware, dubbed "SilentBridge," exploits a previously unknown, or zero-day, vulnerability in network interface card drivers. This allows it to covertly establish a data exfiltration channel using electromagnetic emissions from the hardware itself, a technique long theorized but rarely seen in practical attacks.

The attack chain typically begins with a highly targeted phishing campaign against employees with physical access to secure facilities. Once a workstation on the corporate network is compromised using a crafted document exploit, the attackers plant a payload that spreads to removable drives. When an infected drive is inserted into an air-gapped machine, SilentBridge is deployed, scanning for specific data before encoding it and transmitting it via the covert electromagnetic channel to a nearby receiver.

This campaign is particularly concerning due to its focus on organizations involved in blockchain and crypto asset management. Investigators believe APT37 is seeking proprietary trading algorithms, wallet keys, and transaction ledger data. A successful data breach in this sector could enable massive financial theft or market manipulation, undermining trust in digital asset platforms.

Sentinel Labs warns that this method renders traditional network monitoring tools useless. "We are looking at a paradigm shift," said lead analyst Maria Chen. "The exploit doesn't rely on network packets; it turns the hardware into a radio transmitter. Defenders must now consider physical layer vulnerabilities as a primary attack vector."

The firm has notified the affected hardware vendor, and a patch for the driver vulnerability is in development. In the interim, they recommend stringent physical media controls, disabling unnecessary driver services, and employing signal-jamming equipment in ultra-secure areas. Furthermore, employee training to recognize advanced phishing lures remains a critical first line of defense.

The emergence of SilentBridge underscores a relentless arms race in cybersecurity. As ransomware groups and nation-state actors like APT37 develop increasingly exotic methods to bypass air gaps, the security community must innovate at a similar pace. Protecting isolated networks now requires a blend of digital hygiene, physical security, and electromagnetic shielding to counter these multifaceted threats.

Back to News