ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows
Briefly

ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows
"ScarCruft compromised Windows and Android components of a video game platform dedicated to Yanbian-themed games, trojanizing them with a backdoor. The attack has likely been ongoing since late 2024."
"BirdCall comes fitted with features typically present in a backdoor, enabling screenshot capture, keystroke logging, clipboard content theft, shell command execution, and data gathering."
"The targeting of sqgame[.]net is a deliberate strategy given ScarCruft's history of targeting North Korean defectors, human rights activists, and university professors."
A state-sponsored hacking group aligned with North Korea has compromised a video game platform, implementing a backdoor named BirdCall to target ethnic Koreans in China. This supply chain attack has expanded the malware's reach to Android devices, making it a multi-platform threat. The campaign specifically targets sqgame[.]net, a platform significant for North Korean defectors. BirdCall features include screenshot capture, keystroke logging, and data gathering, and it utilizes legitimate cloud services for command-and-control operations.
Read at The Hacker News
Unable to calculate read time
[
|
]