North Korean hackers target players with trojanized platform – here’s what you need to be aware of


  • North Korean APT37 (ScarCruft) gang compromised a Yanbian gaming platform to deliver the BirdCall backdoor
  • On Windows, it enabled data theft and command execution; on Android it exfiltrated contacts, messages, media and ambient audio
  • The malware is actively maintained, with Android versions still hosted, targeting ethnic Koreans and defectors in China

North Korean state-sponsored threat actors are apparently targeting their compatriots living in (or moving through) China with advanced cross-platform Android backdoors.

A report from security researchers ESET claims to have spotted an advanced supply chain attack that likely began in late 2024. The threat actors, most likely ScarCruft (also known as APT37 or Reaper), managed to compromise SQgame, a multi-platform gaming service built specifically for the people of Yanbian.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top