North Korean APT37 Targets Ethnic Koreans in China with BirdCall Malware
North Korean state-sponsored threat group APT37 (aka ScarCruft or Reaper) is actively targeting ethnic Koreans residing in China. The campaign leverages Android malware dubbed ‘BirdCall’, according to The Record by Recorded Future. This isn’t just about data exfiltration; it’s about specific intelligence collection on a diaspora group, indicating a clear, focused objective.
The attack vector involves a backdoor embedded within a suite of card games developed by a company named Sqgame. This is a classic supply chain compromise, even if it’s via a seemingly innocuous app. Attackers understand that people drop their guard with entertainment software, making it an effective vector for initial access and persistent surveillance.
For defenders, this underscores the need for stringent mobile device security, especially for high-risk individuals or those operating in sensitive regions. The attacker’s calculus here is low-and-slow, relying on social engineering and trust in legitimate-looking applications. Don’t just scan; validate the integrity of all installed applications, even those for leisure.
What This Means For You
- If your organization has personnel, especially those of Korean descent, operating or residing in China, scrutinize their mobile device activity. Specifically, audit installed Android applications, particularly any card games or entertainment apps from lesser-known developers like Sqgame. This is a targeted espionage campaign; assume compromise if you find suspicious activity related to these apps.
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.