CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 07, 2026

North Korean APT Targets Yanbian Gamers via Trojanized Platform

Infosecurity Magazine Archived May 07, 2026 ✓ Full text saved

ESET warns that North Korean hackers compromised a Yanbian gaming site in a supply‑chain attack, trojanizing Windows and Android software to spy on users

Full text archived locally
✦ AI Summary · Claude Sonnet


    A North Korea-aligned espionage group has compromised a regional gaming platform serving ethnic Koreans in China. The Windows and Android software hosted on the site was trojanized with a previously undocumented mobile backdoor. According to new analysis from ESET researchers,  the supply-chain operation has likely been running since late 2024, targeting users of sqgame[.]net, a site dedicated to traditional Yanbian-themed card and board games. Yanbian Korean Autonomous Prefecture is a district which borders North Korea and acts as a known crossing point for refugees and defectors. ESET assessed that the activity was aimed at gathering intelligence on individuals of interest to the Pyongyang regime. Multiplatform Compromise of a Regional Gaming Site ESET attributed the campaign to ScarCruft, also known as APT37, Reaper and Ricochet Chollima, an espionage group active since at least 2012 and historically focused on South Korean government, military and defector-related targets. The investigation began with a suspicious APK uploaded to VirusTotal, which the researchers traced to a card game called Yanbian Red Ten distributed directly from the sqgame website. A second Android title hosted on the same platform, New Drawing, was also found to carry the same malicious code. On Windows, telemetry showed that an update package for the desktop client had served a trojanized mono.dll library since at least November 2024. The patched library acted as a downloader, performing anti-analysis checks before fetching shellcode containing the RokRAT backdoor, which was then used to deploy the more sophisticated BirdCall implant. The iOS game on the same site was untouched, which ESET said likely reflected the difficulty of evading Apple's review process. Read more on ScarCruft activity: North Korea's APT37 Expands Toolkit to Breach Air-Gapped Networks A New Android Variant of a Known Windows Backdoor BirdCall was first identified by ESET as a Windows backdoor in 2021. The Android port, internally named zhuagou, implemented a subset of its predecessor's capabilities and saw active development across seven versions between October 2024 and June 2025. ESET said operators recompiled or repackaged legitimate game APKs with malicious code rather than gaining access to source code, modifying AndroidManifest.xml to redirect the entry point through the backdoor before launching the original game activity. Once running, the malware harvested contacts, call logs, SMS messages, documents, media files and private keys. It could also capture screenshots and record ambient audio, although researchers noted the recording function was restricted to a three-hour window between 7 pm and 10 pm local time. Command-and-control (C2) traffic was routed through cloud storage providers, including pCloud, Yandex Disk, and Zoho WorkDrive, although ESET observed only Zoho WorkDrive being used in this campaign, with 12 separate accounts identified during the investigation. The cybersecurity company notified sqgame of the compromise in December 2025 but had received no response at the time of publication, and the malicious APKs remains available on the site.
    💬 Team Notes
    Article Info
    Source
    Infosecurity Magazine
    Category
    ◇ Industry News & Leadership
    Published
    May 07, 2026
    Archived
    May 07, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗