A rigged game: ScarCruft compromises gaming platform in a supply-chain attack

https://web-assets.esetstatic.com/wls/2026/04-26/scarcruft/scarcruft-gaming-platform-supply-chain-attack.jpg

ESET researchers uncovered a multiplatform supply-chain attack by North Korea-aligned APT group ScarCruft, targeting the Yanbian region in China – home to ethnic Koreans and a crossing point for North Korean refugees and defectors. In the attack, probably ongoing since late 2024, ScarCruft compromised Windows and Android components of a video game platform dedicated to Yanbian-themed games, trojanizing them with a backdoor.

The backdoor, named BirdCall by ESET, was originally known to target Windows only; the Android version was discovered as part of this supply-chain attack. In this blogpost, we provide an overview of the attack, and the first public analysis of the Android backdoor.

Key points of this blogpost:North Korea-aligned APT group ScarCruft compromised a video game platform used by ethnic Koreans living in the Yanbian region in China.The gaming platform’s Windows client was compromised through a malicious update leading to the RokRAT backdoor, which deployed the...

Copyright of this story solely belongs to welivesecurity.com. To see the full text click HERE