Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ScarCruft Targets Game Platform with BirdCall Malware

ScarCruft Targets Game Platform with BirdCall Malware

Posted on May 5, 2026 By CWS

The North Korean-linked cyber espionage group, ScarCruft, has executed a supply chain attack on a video game platform, embedding the BirdCall malware to potentially target ethnic Koreans in China. This operation extends the malware’s reach from Windows to Android devices, creating a significant multi-platform threat. The attack centers on sqgame[.]net, a gaming hub popular among Koreans residing in the Yanbian area, a critical transit region for North Korean defectors.

ScarCruft’s Strategic Targeting

ScarCruft’s attack strategy appears intentional, leveraging their history of targeting North Korean defectors, human rights activists, and academics. The group has reportedly been compromising the gaming platform’s components since late 2024, according to ESET’s report shared with The Hacker News. The Windows version of BirdCall, a sophisticated variant of the RokRAT malware, has been active since 2021. This malware family has adapted over time to target various operating systems, including macOS and Android.

BirdCall is equipped with backdoor functionalities that allow it to capture screenshots, log keystrokes, steal clipboard content, execute shell commands, and gather data. It operates using legitimate cloud services such as Dropbox and pCloud for command-and-control purposes. Typically, BirdCall is deployed through a multi-stage loading process, initiated with a Ruby or Python script and encrypted with a machine-specific key.

Impact on Android and Windows Devices

The Android iteration of BirdCall, distributed via the sqgame[.]net supply chain breach, mirrors some functionalities of its Windows counterpart. It collects contact lists, SMS messages, call logs, media files, documents, screenshots, and ambient audio. Analysis has identified seven versions of this malware since October 2024. Notably, the Android APKs available on the platform were compromised, while the Windows desktop client and iOS applications remained unaffected.

The breach occurred sometime in late 2024, though precise timing remains elusive. An update package for the Windows client was found to contain a trojanized DLL from November 2024, which was later cleaned. This DLL included a downloader to detect analysis tools and virtual environments before downloading and executing RokRAT shellcode. The backdoor then facilitated the installation of BirdCall on compromised hosts.

Ongoing Threat and Surveillance Capabilities

The Android version of BirdCall, like its Windows variant, uses legitimate cloud services such as pCloud, Yandex Disk, and Zoho WorkDrive for communication. The backdoor continues to evolve, enhancing its surveillance features like personal data collection, document theft, screenshot capturing, and voice recording capabilities. ESET’s findings underscore the persistent threat posed by ScarCruft’s cyber operations, which leverage advanced malware to infiltrate and compromise multiple devices.

While the immediate threat from the compromised update package has been neutralized, the ongoing development of BirdCall poses a continuous risk. It highlights the need for robust cybersecurity measures and vigilance among users to protect against such sophisticated cyber threats.

The Hacker News Tags:Android, BirdCall, cyber espionage, Cybersecurity, gaming platform, Malware, North Korea, ScarCruft, supply chain attack, Windows

Post navigation

Previous Post: Fake Notepad++ Mac Site Poses Cybersecurity Threat
Next Post: Critical Vulnerabilities in MetInfo and Weaver E-cology Exploited

Related Posts

Google Fined 9 Million by French Regulator for Cookie Consent Violations Google Fined $379 Million by French Regulator for Cookie Consent Violations The Hacker News
AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More The Hacker News
OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link The Hacker News
How to Close Threat Detection Gaps: Your SOC’s Action Plan How to Close Threat Detection Gaps: Your SOC’s Action Plan The Hacker News
Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats The Hacker News
Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover Chaos Mesh Critical GraphQL Flaws Enable RCE and Full Kubernetes Cluster Takeover The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apache Patches Critical Vulnerabilities in HTTP Server
  • AI Service Security Risks: A Deep Dive into Exposed Systems
  • New Framework Enhances APT Attribution
  • Critical Vulnerabilities in MetInfo and Weaver E-cology Exploited
  • ScarCruft Targets Game Platform with BirdCall Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apache Patches Critical Vulnerabilities in HTTP Server
  • AI Service Security Risks: A Deep Dive into Exposed Systems
  • New Framework Enhances APT Attribution
  • Critical Vulnerabilities in MetInfo and Weaver E-cology Exploited
  • ScarCruft Targets Game Platform with BirdCall Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark