<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sqgame — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/sqgame/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/sqgame/feed.xml" rel="self" type="application/rss+xml"/><item><title>ScarCruft Compromises Gaming Platform in Supply-Chain Attack</title><link>https://feed.craftedsignal.io/briefs/2026-05-scarcruft-gaming-supply-chain/</link><pubDate>Wed, 06 May 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-scarcruft-gaming-supply-chain/</guid><description>The ScarCruft APT group conducted a supply-chain attack targeting the Yanbian region by compromising a gaming platform, sqgame, used by ethnic Koreans, trojanizing Windows and Android games with the BirdCall backdoor for espionage activities since late 2024.</description><content:encoded><![CDATA[<p>ESET researchers uncovered a multiplatform supply-chain attack by the North Korea-aligned APT group ScarCruft, targeting the Yanbian region in China since late 2024. The group compromised the Windows and Android components of a video game platform called sqgame, which is dedicated to Yanbian-themed games. ScarCruft trojanized the games with a backdoor named BirdCall, originally known to target Windows, with the Android version discovered as part of this supply-chain attack. The compromised gaming platform distributed malicious updates and trojanized Android games, aiming to collect personal data, documents, screenshots, and voice recordings from users in the targeted region.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>ScarCruft compromises the sqgame gaming platform&rsquo;s infrastructure, likely through exploiting vulnerabilities or weak credentials.</li>
<li>The attackers trojanize the mono.dll library within an update package for the Windows desktop client of the sqgame platform, hosted at <a href="http://xiazai.sqgame.com">http://xiazai.sqgame.com</a>[.]cn/dating/20240429.zip.</li>
<li>Legitimate users of the sqgame platform download and install the compromised update package, unknowingly deploying the trojanized mono.dll on their Windows systems.</li>
<li>The trojanized mono.dll acts as a downloader, retrieving and executing the RokRAT backdoor on the victim&rsquo;s machine, which then deploys the more sophisticated BirdCall backdoor.</li>
<li>ScarCruft trojanizes Android game APKs (延边红十 and 新画图) available for download on the official sqgame website, <a href="https://www.sqgame">https://www.sqgame</a>[.]net.</li>
<li>Victims download and install the trojanized Android games (ybht.apk and sqybhs.apk), which contain the Android version of the BirdCall backdoor, onto their Android devices.</li>
<li>The BirdCall backdoor (both Windows and Android versions) establishes command and control (C2) communication with attacker-controlled infrastructure.</li>
<li>The BirdCall backdoor collects sensitive information, including contacts, SMS messages, call logs, documents, media files, private keys, screenshots, and voice recordings, and exfiltrates the data to the attackers, serving as espionage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This supply-chain attack targeted ethnic Koreans living in the Yanbian region, a community of interest to the North Korean regime. The compromise of the gaming platform could have affected thousands of users, leading to the theft of personal data, sensitive documents, and private communications. If successful, ScarCruft gains access to information on individuals based in or originating from the Yanbian region, likely refugees or defectors deemed of interest to North Korea.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to the compromised sqgame domain (sqgame.com[.]cn) and associated IPs (39.106.249[.]68) as these are used to deliver malicious content.</li>
<li>Implement file integrity monitoring for mono.dll and alert on modifications to this file, using the SHA-1 hash (95BDB94F6767A3CCE6D92363BBF5BC84B786BDB0) as a baseline for comparison.</li>
<li>Block downloads from the malicious URLs (<a href="http://sqgame.com">http://sqgame.com</a>[.]cn/ybht.apk, <a href="http://sqgame.com">http://sqgame.com</a>[.]cn/sqybhs.apk, <a href="http://xiazai.sqgame.com">http://xiazai.sqgame.com</a>[.]cn/dating/20240429.zip) at the network perimeter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>supply-chain attack</category><category>apk</category><category>backdoor</category><category>android</category><category>windows</category><category>scarcruft</category></item></channel></rss>