Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

AI Adoption Outpaces Safety Policies, Leaving Organizations Exposed

May 6, 2026

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

May 6, 2026

North Korean APT Targets Yanbian Gamers via Trojanized Platform

May 5, 2026
Facebook X (Twitter) Instagram
Wednesday, May 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»North Korean APT Targets Yanbian Gamers via Trojanized Platform
News

North Korean APT Targets Yanbian Gamers via Trojanized Platform

Team-CWDBy Team-CWDMay 5, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A North Korea-aligned espionage group has compromised a regional gaming platform serving ethnic Koreans in China. The Windows and Android software hosted on the site was trojanized with a previously undocumented mobile backdoor.

According to new analysis from ESET researchers,  the supply-chain operation has likely been running since late 2024, targeting users of sqgame[.]net, a site dedicated to traditional Yanbian-themed card and board games.

Yanbian Korean Autonomous Prefecture is a district which borders North Korea and acts as a known crossing point for refugees and defectors.

ESET assessed that the activity was aimed at gathering intelligence on individuals of interest to the Pyongyang regime.

Multiplatform Compromise of a Regional Gaming Site

ESET attributed the campaign to ScarCruft, also known as APT37, Reaper and Ricochet Chollima, an espionage group active since at least 2012 and historically focused on South Korean government, military and defector-related targets.

The investigation began with a suspicious APK uploaded to VirusTotal, which the researchers traced to a card game called Yanbian Red Ten distributed directly from the sqgame website. A second Android title hosted on the same platform, New Drawing, was also found to carry the same malicious code.

On Windows, telemetry showed that an update package for the desktop client had served a trojanized mono.dll library since at least November 2024. The patched library acted as a downloader, performing anti-analysis checks before fetching shellcode containing the RokRAT backdoor, which was then used to deploy the more sophisticated BirdCall implant.

The iOS game on the same site was untouched, which ESET said likely reflected the difficulty of evading Apple’s review process.

Read more on ScarCruft activity: North Korea’s APT37 Expands Toolkit to Breach Air-Gapped Networks

A New Android Variant of a Known Windows Backdoor

BirdCall was first identified by ESET as a Windows backdoor in 2021. The Android port, internally named zhuagou, implemented a subset of its predecessor’s capabilities and saw active development across seven versions between October 2024 and June 2025.

ESET said operators recompiled or repackaged legitimate game APKs with malicious code rather than gaining access to source code, modifying AndroidManifest.xml to redirect the entry point through the backdoor before launching the original game activity.

Once running, the malware harvested contacts, call logs, SMS messages, documents, media files and private keys. It could also capture screenshots and record ambient audio, although researchers noted the recording function was restricted to a three-hour window between 7 pm and 10 pm local time.

Command-and-control (C2) traffic was routed through cloud storage providers, including pCloud, Yandex Disk, and Zoho WorkDrive, although ESET observed only Zoho WorkDrive being used in this campaign, with 12 separate accounts identified during the investigation.

The cybersecurity company notified sqgame of the compromise in December 2025 but had received no response at the time of publication, and the malicious APKs remains available on the site.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More
Next Article Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack
Team-CWD
  • Website

Related Posts

News

AI Adoption Outpaces Safety Policies, Leaving Organizations Exposed

May 6, 2026
News

Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack

May 6, 2026
News

Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking & More

May 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

2025’s most common passwords were as predictable as ever

January 21, 2026

How to help older family members avoid scams

October 31, 2025

What’s at stake if your employees post too much online

December 1, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.