Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Copernicus Sentinel 1D satellite begins full operation

ScarCruft hacks gaming platforms and deploys BirdCall malware on Android and Windows

King Charles launches Project Nova to track space debris from Bermuda

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » ScarCruft hacks gaming platforms and deploys BirdCall malware on Android and Windows
Identity

ScarCruft hacks gaming platforms and deploys BirdCall malware on Android and Windows

By May 5, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMay 5, 2026Cyber ​​espionage/surveillance

A North Korean-aligned state-sponsored hacker group known as ScarCruft compromised video gaming platforms with supply chain espionage attacks and trojanized their components with a backdoor called BirdCallto, likely targeting ethnic Koreans living in China.

While previous versions of the backdoor primarily targeted only Windows users, the supply chain attack is credited with allowing attackers to target Android devices as well, making it a multi-platform threat in nature.

According to ESET, sqgame was chosen for the campaign.[.]net is a gaming platform used by ethnic Koreans living in China’s Yanbian region, which borders North Korea and Russia. It is also known as a major, high-risk transit point for North Korean defectors crossing the Tumen River.

The platform’s targeting is said to be a deliberate strategy given ScarCruft’s storied history of targeting North Korean defectors, human rights activists, and university professors.

“In an ongoing attack, likely since late 2024, ScarCruft compromised and backdoored the Windows and Android components of a video game platform dedicated to Yanbian-themed games,” the Slovak cybersecurity firm said in a report shared with The Hacker News ahead of publication.

The Windows version of BirdCall, called the advanced evolution of RokRAT, has been detected in the wild since 2021. Over the years, RokRAT has also been adapted to target macOS (CloudMensis) and Android (RambleOn), indicating that this malware family continues to be actively maintained by threat actors.

BirdCall includes features typically present in backdoors, allowing it to capture screenshots, log keystrokes, steal clipboard contents, execute shell commands, and collect data. Similar to RokRAT, this malware relies on legitimate cloud services such as Dropbox and pCloud for command and control (C2).

“BirdCall typically starts with a Ruby or Python script and is deployed in a multi-stage loading chain that includes components encrypted using a computer-specific key,” ESET said.

Android version of BirdCall. Distributed as part of sqgame.[.]Net supply chain attacks incorporate a subset of their Windows counterparts and collect contact lists, SMS messages, call logs, media files, documents, screenshots, and ambient audio. Analysis of the malware’s lineage revealed seven versions, the first of which dates back to October 2024.

Interestingly, the supply chain attack was found to only infect Android APKs that can be downloaded from the platform, leaving Windows desktop clients and iOS games unharmed. Download pages for two Android games hosted on sqgame[.]net has been modified to serve malicious APKs –

sqgame.com[.]cn/ybht.apk sqgame.com[.]cn/sqybhs.apk

It is currently unknown when the website was compromised and the compromised APK began being distributed. However, this incident is believed to have occurred in late 2024. Additionally, evidence has emerged that Windows Desktop Client update packages have been delivering Trojanized DLLs for an unspecified period of time since at least November 2024. Updated packages are no longer malicious.

Specifically, the modified DLL contained an analysis tool and a downloader that checked the list of running processes in the virtual machine environment before proceeding to download and execute the shellcode containing RokRAT. BirdCall is then retrieved using a backdoor and installed on the infected host.

The Android version of BirdCall also relies on legitimate cloud storage services for C2 communication. This includes pCloud, Yandex Disk, and Zoho WorkDrive. The last type of work drive is becoming increasingly common across multiple campaigns.

“Android backdoors are under active development and offer surveillance capabilities such as collecting personal data and documents, taking screenshots, and recording audio,” ESET said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleKing Charles launches Project Nova to track space debris from Bermuda
Next Article Copernicus Sentinel 1D satellite begins full operation

Related Posts

Weaver E-cology RCE flaw CVE-2026-22679 can be actively exploited via the debug API

May 5, 2026

Microsoft details phishing campaign that targeted 35,000 users in 26 countries

May 5, 2026

Phishing campaign using SimpleHelp and ScreenConnect RMM tools hits over 80 organizations

May 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Copernicus Sentinel 1D satellite begins full operation

ScarCruft hacks gaming platforms and deploys BirdCall malware on Android and Windows

King Charles launches Project Nova to track space debris from Bermuda

Weaver E-cology RCE flaw CVE-2026-22679 can be actively exploited via the debug API

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.