Shared from twixb · bleepingcomputer.com

ScarCruft hackers push BirdCall Android malware via game platform

bleepingcomputer.com·May 5, 2026

The North Korean hacker group APT37, also known as ScarCruft, has developed an Android variant of their BirdCall backdoor malware, which is being distributed via a compromised game platform targeting users in the Yanbian region of China. This Android version, created around October 2024, functions as spyware, capable of extracting sensitive information and monitoring user activity.

The key insight for you is the emergence of a new Android variant of the BirdCall backdoor, developed by North Korean APT37 and deployed via a compromised game platform. This highlights the importance of monitoring supply-chain attacks targeting mobile platforms and underscores the need for vigilance in endpoint security and threat intelligence to identify and mitigate similar threats. It's crucial to advise stakeholders to restrict downloads to official marketplaces to minimize exposure to such malware.

Powered by twixb

Want more content like this?

twixb tracks your favorite blogs and social media, filters by keywords, and delivers personalized key learnings — straight to your inbox.

More from Cybersecurity News

Recent stories curated alongside this one.