North Korea's ScarCruft APT Compromises Gaming Site to Spy on Ethnic Koreans in China

North Korean APT ScarCruft Hits Gaming Platform in Supply-Chain Attack

HIGH
May 6, 2026
5m read
Threat ActorSupply Chain AttackMobile Security

Related Entities

Threat Actors

Organizations

Products & Tech

Yandex DiskZoho WorkDrive

Other

BirdCallpCloud

Full Report

Executive Summary

ESET researchers have uncovered a sophisticated, ongoing supply-chain attack orchestrated by the North Korean state-sponsored group ScarCruft (also known as APT37, Reaper, or Ricochet Chollima). The campaign, which began in late 2024, involves the compromise of a gaming website, sqgame[.]net, popular with the ethnic Korean community in China's Yanbian Prefecture. The threat actors trojanized the platform's Windows and Android game installers, embedding them with a previously undocumented Android variant of their BirdCall spyware. This malware is a powerful surveillance tool designed to harvest a vast amount of data from a victim's device, including contacts, SMS, call logs, and even ambient audio recordings. The campaign's specific targeting suggests a clear espionage and surveillance motive aimed at individuals who may be of interest to the North Korean government, such as defectors or their contacts.


Threat Overview

The attack vector is a classic supply chain attack, where a trusted software distribution channel is compromised to deliver malware to unsuspecting users.

  1. Compromise of sqgame[.]net: ScarCruft gained control over the distribution mechanism of the gaming website.
  2. Trojanized Installers: The attackers modified legitimate game installers for both Windows and Android (e.g., "Yanbian Red Ten," "New Drawing"), embedding their malware.
  3. User Infection: Users download and install what they believe to be a legitimate game, but are also installing the BirdCall backdoor.
  4. Malware Execution: On Android, the attackers modified the AndroidManifest.xml file to ensure the backdoor code runs before the actual game starts.
  5. Data Collection: The BirdCall spyware begins harvesting a wide range of personal and device data.
  6. C2 and Exfiltration: The stolen data is exfiltrated to command-and-control (C2) infrastructure that leverages legitimate cloud storage services, including pCloud, Yandex Disk, and Zoho WorkDrive, to hide its traffic.

Technical Analysis

The Android variant of BirdCall (internally named "zhuagou") is a fully-featured spyware implant. Its capabilities include:

  • Data Harvesting: Stealing contact lists, call logs, SMS messages, media files, and documents. (T1432 - Access Stored Application Data)
  • Audio Surveillance: Recording ambient audio using the device's microphone. Interestingly, this function was programmed to operate only during a specific time window (7 p.m. to 10 p.m. local time), possibly to capture conversations during evening hours while minimizing battery drain. (T1425 - Record Audio)
  • Screenshotting: Capturing the device's screen. (T1428 - Capture Screenshot)

The use of legitimate cloud services for C2 is a common APT tactic (T1071.001 - Application Layer Protocol: Web Protocols) designed to make detection and blocking difficult. Network traffic to services like pCloud or Yandex is often permitted and not closely inspected, allowing the exfiltrated data to blend in with normal user activity.

MITRE ATT&CK for Mobile Techniques Observed:

Impact Assessment

This campaign poses a severe threat to the targeted community. For the individuals spied upon, the consequences could be dire, potentially leading to harassment, abduction, or harm to themselves or their families, given the nature of the North Korean regime. The attack demonstrates ScarCruft's continued focus on surveillance and intelligence gathering against defectors, activists, and other individuals deemed a threat. The use of a gaming platform popular within a specific demographic shows a high degree of target knowledge and operational planning.

Detection & Response

  • Application Vetting: Users should be cautious when installing applications, even from seemingly legitimate sources. Use mobile security software to scan new apps.
  • Network Traffic Analysis (D3-NTA): Monitor network logs for connections from mobile devices to cloud storage services like pCloud, Yandex Disk, or Zoho WorkDrive, especially if the user does not have a legitimate account for those services.
  • File Analysis (D3-FA): Security researchers can analyze APKs downloaded from sqgame[.]net to check for malicious modifications or the presence of the BirdCall backdoor code.

Mitigation

  • Avoid Third-Party App Stores: Whenever possible, users should only install applications from official app stores like Google Play, which have more robust security scanning.
  • Review App Permissions: Before installing any app, carefully review the permissions it requests. A game should not need access to your contacts, SMS messages, or microphone. Deny any suspicious permission requests.
  • Use Mobile Security Software: Install and maintain a reputable mobile antivirus/security application on Android devices.
  • Vendor Notification: ESET has notified the operators of sqgame[.]net. Users of the platform should cease using it until the operators confirm they have removed the malicious files and secured their infrastructure.

Timeline of Events

1
October 1, 2024
ScarCruft likely began the supply-chain attack and development of the 'zhuagou' Android malware.
2
December 1, 2025
ESET notified the operators of sqgame[.]net about the compromise.
3
May 6, 2026
This article was published

MITRE ATT&CK Mitigations

Users should uninstall applications from untrusted sources, especially those that request excessive permissions.

In a corporate environment, block access to unauthorized cloud storage providers on mobile devices to prevent data exfiltration.

Mapped D3FEND Techniques:

Educate users about the dangers of installing applications from third-party stores and the importance of reviewing app permissions before installation.

Timeline of Events

1
October 1, 2024

ScarCruft likely began the supply-chain attack and development of the 'zhuagou' Android malware.

2
December 1, 2025

ESET notified the operators of sqgame[.]net about the compromise.

Sources & References

North Korean APT Targets Yanbian Gamers via Trojanized Platform
Infosecurity Magazine (infosecurity-magazine.com) May 5, 2026
North Koreans Spy on Defectors Via Android Game Apps
BankInfoSecurity (bankinfosecurity.com) May 5, 2026
ScarCruft Supply Chain Attack Targets Gaming Platform Users
Cyber Press (cyberpress.com) May 5, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

ScarCruftAPT37North KoreaSupply Chain AttackAndroidBirdCallSpywareEspionage

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.