radar

ONE Sentinel

securitySecurity/THREATS/HIGH

ScarCruft hackers push BirdCall Android malware via game platform

sourceBleeping Computer
calendar_todayMay 5, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

ScarCruft Hackers Deploy BirdCall Malware via Game Platform

Summary

The article discusses a supply-chain attack by the North Korean hacker group APT37, also known as ScarCruft, which is distributing the BirdCall Android malware through a video game platform.

Key Points

  • The attack is attributed to APT37, a North Korean hacker group also known as ScarCruft.
  • The malware involved is an Android backdoor named BirdCall.
  • The distribution method is a supply-chain attack via a video game platform.
  • The attack targets Android devices, leveraging a popular platform to increase reach.

Analysis

This incident highlights the growing trend of using supply-chain attacks to distribute malware, exploiting trusted platforms to reach a wide audience. The involvement of a state-sponsored group like APT37 underscores the sophistication and potential geopolitical motivations behind such attacks. The use of a video game platform as a vector is particularly concerning due to the large user base and potential for rapid spread.

Conclusion

IT professionals should be vigilant about the security of third-party platforms and consider implementing additional security measures for Android devices. Regular monitoring and updates are crucial to mitigate the risks posed by such sophisticated threats.