North Korean Hackers Target Gamers With Trojanized Platform: Here’s What To Watch For


  • North Korean gang APT37 (ScarCruft) compromised a Yanbian gaming platform to deliver the BirdCall backdoor
  • On Windows, it allowed data theft and command execution; on Android it exfiltrated contacts, messages, media and ambient sound
  • The malware is actively maintained, with Android versions still hosted, targeting ethnic Koreans and defectors in China.

North Korean state-sponsored threat actors are apparently targeting their compatriots living in (or passing through) China with advanced Android backdoors on gaming platforms.

A report from ESET security researchers claims to have observed an advanced supply chain attack that likely began in late 2024. The threat actors, most likely ScarCruft (also known as APT37, or Reaper), managed to compromise SQgame, a cross-platform gaming service designed specifically for residents of Yanbian.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top