- North Korean APT37 (ScarCruft) gang compromised a Yanbian gaming platform to ship the BirdCall backdoor
- On Home windows, it enabled knowledge theft and command execution; on Android, it exfiltrated contacts, messages, media, and ambient audio
- The malware is actively maintained, with Android variations nonetheless hosted, focusing on ethnic Koreans and defectors in China
North Korean state-sponsored menace actors are apparently focusing on their compatriots residing in (or shifting by means of) China with superior Android backdoors throughout gaming platforms.
A report from safety researchers ESET claims to have seen a complicated supply-chain assault that in all probability started in late 2024. The menace actors, more than likely ScarCruft (often known as APT37, or Reaper), managed to compromise SQgame, a multi-platform gaming service constructed particularly for the individuals of Yanbian.
The Yanbian Korean Autonomous Prefecture is an autonomous prefecture in China’s Jilin Province. It’s positioned close to the border with North Korea and Russia, and was established to provide administrative autonomy to the big inhabitants of ethnic Koreans residing there. In response to ESET, Yanbian can be a key crossing level for North Korean refugees and defectors, which might be one of many explanation why it’s being focused.
Article continues beneath
BirdCall malware
“Within the assault, in all probability ongoing since late 2024, ScarCruft compromised Home windows and Android parts of a online game platform devoted to Yanbian-themed video games, trojanizing them with a backdoor,” ESET mentioned.
The backdoor is known as BirdCall and, relying on the platform it’s put in on, can do various things. On Home windows, it might seize screenshots, log keystrokes, steal the contents of the clipboard, execute shell instructions, and exfiltrate knowledge. The entire stolen information is then uploaded to legit cloud companies resembling Dropbox or pCloud.
On Android, issues are a bit completely different, permitting ScarCruft to additionally exfiltrate contact lists, SMS messages, name logs, media information, paperwork, screenshots, and even ambient audio. Thus far, the malware was up to date seven occasions, main researchers to consider it’s being actively maintained.
ESET says that the platform remains to be internet hosting malicious video games. Nevertheless, these appear to be restricted to the Android platform.
The perfect antivirus for all budgets
Observe TechRadar on Google Information and add us as a most well-liked supply to get our skilled information, critiques, and opinion in your feeds.

