<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Spyware — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/spyware/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 09:04:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/spyware/feed.xml" rel="self" type="application/rss+xml"/><item><title>ScarCruft (APT37) Deploying BirdCall Android Backdoor via Compromised Game Platform</title><link>https://feed.craftedsignal.io/briefs/2026-05-scarcruft-birdcall-android/</link><pubDate>Tue, 05 May 2026 09:04:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-scarcruft-birdcall-android/</guid><description>The APT37 group (ScarCruft) is distributing an Android version of the BirdCall backdoor via a supply-chain attack targeting a Chinese video game platform, sqgame[.]net, to collect sensitive information from users.</description><content:encoded><![CDATA[<p>The North Korean hacker group APT37, also known as ScarCruft and Ricochet Chollima, is actively distributing an Android version of their BirdCall backdoor through a supply-chain attack affecting the sqgame[.]net video game platform. This platform caters specifically to Koreans in the autonomous Yanbian region in China, which acts as a crossing point for North Korean defectors and refugees. ESET researchers discovered that APT37 created the Android version of BirdCall around October 2024 and has since developed at least seven different versions. The Android variant is designed as spyware, capable of collecting a wide range of sensitive information from compromised devices. This campaign highlights APT37&rsquo;s continued efforts to target specific communities with sophisticated malware.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises the sqgame[.]net video game platform, a site hosting games for Android, iOS, and Windows.</li>
<li>The attacker trojanizes legitimate Android application packages (APKs) available on the platform, embedding the Android version of BirdCall.</li>
<li>Victims download the trojanized APK from the compromised game platform (sqgame[.]net) onto their Android devices.</li>
<li>Upon installation, the BirdCall malware extracts IP geolocation information from the device.</li>
<li>The malware collects contact lists, call logs, and SMS messages from the compromised device.</li>
<li>The malware gathers device information including OS version, kernel version, rooted status, IMEI number, MAC address, IP address, and network information.</li>
<li>BirdCall transmits collected data, along with battery temperature, RAM, storage, cloud configuration, backdoor version, and targeted file extensions (.jpg, .doc, .docx, .xls, .xlsx, .ppt, .pptx, .txt, .hwp, .pdf, .m4a, and .p12), to its command-and-control (C2) server.</li>
<li>The malware periodically takes screenshots and records audio via the microphone from 7 pm to 10 pm local time, exfiltrating these files to the C2 server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This campaign allows APT37 to harvest sensitive information from targeted individuals, including personal communications, location data, and device details. The compromise of the sqgame[.]net platform exposes users in the Korean autonomous Yanbian region in China to significant privacy risks. Successful infection enables the threat actor to conduct surveillance, gather intelligence, and potentially identify and track individuals of interest. The collected data can be used for further espionage activities or to compromise other systems and networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to the sqgame[.]net domain, blocking it at the firewall or DNS resolver to prevent further infections (IOC: sqgame[.]net).</li>
<li>Implement application control policies on Android devices to restrict the installation of applications from untrusted sources.</li>
<li>Deploy the Sigma rule &ldquo;Detect Network Connection to sqgame.net&rdquo; to identify potentially infected devices communicating with the malicious domain.</li>
<li>Educate users about the risks of downloading applications from unofficial sources and encourage them to only use trusted app stores.</li>
<li>Enable enhanced security measures like Google Play Protect to detect and remove malicious apps.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>android</category><category>malware</category><category>spyware</category><category>apt37</category><category>scarcruft</category><category>supply-chain</category></item><item><title>ToTok iOS Application Used for Government Surveillance</title><link>https://feed.craftedsignal.io/briefs/2024-01-totok-spyware/</link><pubDate>Sat, 27 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-totok-spyware/</guid><description>The ToTok iOS application, developed by Breej Holding Ltd., was identified as a spying tool used by the government of the United Arab Emirates (UAE) to track users' conversations, movements, and relationships by collecting sensitive user data and transmitting it to servers using self-signed certificates.</description><content:encoded><![CDATA[<p>The ToTok application, developed by Breej Holding Ltd., gained popularity in the United Arab Emirates (UAE) due to the blocking of other VoIP services like Skype and WhatsApp. However, American officials identified ToTok as a spying tool used by the UAE government to track users. The application collects extensive user data, including microphone, calendar, location, photos, contacts, and camera information. This data is transmitted over the network, with traffic primarily routed through the capi.im.totok.ai server. The application&rsquo;s Info.plist reveals it requests permissions for accessing sensitive user information, and uses HTTP, which is atypical for iOS applications, as iOS typically enforces HTTPS only. The application has since been removed from the iOS App Store after these concerns were raised.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User downloads and installs the ToTok application from the iOS App Store.</li>
<li>The application requests permissions to access microphone, calendar, location, photos, contacts, camera, and Siri integration.</li>
<li>User grants the application permissions to access their data.</li>
<li>The application collects user data, including contacts, location, and communications.</li>
<li>The application transmits collected data to the capi.im.totok.ai server.</li>
<li>Network communications are encrypted via SSL, but the application uses a self-signed certificate, potentially undermining trust.</li>
<li>The UAE government leverages the collected data for surveillance purposes.</li>
<li>The application runs in the background due to UIBackgroundModes, continuously collecting and transmitting data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The ToTok application enabled mass surveillance by the UAE government, impacting tens of thousands of users. User privacy was compromised, with conversations, movements, relationships, appointments, sounds, and images being tracked. The application&rsquo;s ability to run in the background allowed for continuous data collection, and the use of a self-signed certificate raises concerns about the security and integrity of the transmitted data. The removal of the app from the iOS App Store indicates a recognition of the severe security and privacy risks posed by ToTok.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to the domain <code>im.totok.ai</code> and block if found, as this was the primary communication channel (IOC table).</li>
<li>Implement a detection rule to identify applications using self-signed certificates issued from the United Arab Emirates (AE), as observed with the ToTok application (see rule: &ldquo;Detect iOS App Connecting to Host with UAE Self-Signed Certificate&rdquo;).</li>
<li>Develop a Sigma rule to detect iOS applications requesting access to microphone, camera, location, photos, contacts, siri integration, and calendar permissions simultaneously, as this is indicative of potentially malicious data collection (see rule: &ldquo;Detect iOS App Requesting Excessive Permissions&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>spyware</category><category>ios</category><category>surveillance</category><category>totok</category></item></channel></rss>