ScarCruft and BirdCall: when a gaming platform becomes a spying weapon

ScarCruft infiltrates gaming platform to distribute BirdCall malware on Windows and Android

On May 5, 2026, ESET researchers published findings on an active espionage campaign carried out by ScarCruft —also known as APT37 or Reaper—, an advanced persistent threat (APT) group aligned with North Korea that has been active since at least 2012. The group compromised sqgame[.]net, a video gaming platform aimed at ethnic Koreans in China’s Yanbian region, to distribute the BirdCall backdoor on both Windows systems and Android devices, making it a cross-platform threat for the first time.


The incident: a gaming platform as an infection vector

sqgame[.]net hosts traditional games from the Yanbian region —a border area between China, North Korea, and Russia— for Windows, Android, and iOS. The platform is widely used by the local Korean community, which also includes North Korean refugees and defectors who use the region as a transit point.

According to ESET, the compromise likely began around late 2024. The attackers modified two key elements of the platform:

ESET researcher Filip Jurčacko, who discovered the attack, noted that the campaign was identified in October 2025 and that the trojanized Android games were still available for download at the time of publication. ESET notified sqgame of the compromise in December 2025, receiving no response.


The problem: the trap of software you already trust

What makes this campaign especially dangerous is its nature as a supply-chain attack. Instead of tricking victims into downloading software from unknown sites, the attackers infected the official source: the very platform that users already know, already use, and already trust.

This attack vector subverts the most basic security advice. A user who downloads an update from the official website of their favorite application has no immediate reason to suspect anything. There are no phishing emails, no suspicious domains, no visible warnings. The pre-established trust in the platform is precisely the mechanism the attacker exploits.

The danger of this attack model can be summarized in three points:


Analysis: targeted espionage and total device control

The selection of sqgame[.]net is no coincidence. The Yanbian region hosts the largest ethnic Korean community outside the peninsula and is a high-risk transit route for North Korean defectors. The campaign’s profile is consistent with ScarCruft’s historical operations, whose focus includes the South Korean government, military organizations, human rights activists, and individuals connected to the interests of the North Korean regime.

BirdCall capabilities

Once installed, BirdCall gives operators near-total access to the compromised device. Its documented capabilities include:

Platform Backdoor capabilities
Windows Highly complex C++ implant; access to files, documents, and private keys; remote command execution
Android Collection of contacts, call logs, SMS, multimedia files, documents, and screenshots; ambient audio recording

The Android variant —internally named zhuagou— was actively developed between October 2024 and June 2025, with at least seven identified versions. On Windows, the infection process is initiated through a multi-stage chain that begins with a Ruby or Python script, with components encrypted using a key specific to the compromised machine, which hinders forensic analysis outside the victim’s environment.

This type of campaign, targeting specific and geographically delimited populations, represents an evolution toward precision espionage: less noisy than mass attacks, but potentially devastating for vulnerable communities like North Korean defectors, whose exposure can have consequences that go far beyond data loss.


Security recommendations

Although the main vector of this campaign was a compromised platform in a specific geographic niche, the lessons it leaves are applicable to any user or security team.

For individual users

For security teams and organizations


In summary…

The ScarCruft and BirdCall case illustrates an uncomfortable reality: the trust we place in software we already use can become the weakest link in our security. The supply chain is not an abstract risk reserved for large corporations; any platform, however small or specialized, can become a vector if its operators lack adequate integrity controls.

The answer to the problem is not to stop updating software —that path leads to even greater vulnerabilities— but to develop the habit of verifying, keeping security tools active, and paying attention to signs of anomalous behavior. In a landscape where threat groups with state resources target even very specific communities, vigilance is not paranoia: it is digital hygiene.


Sources consulted: