home.social

#scarcruft — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #scarcruft, aggregated by home.social.

  1. A rigged game: compromises gaming platform in a supply-chain attack

    North Korea-aligned APT group ScarCruft executed a multiplatform supply-chain attack targeting ethnic Koreans in China's Yanbian region, an area significant for North Korean refugees and defectors. Since late 2024, the group compromised a video gaming platform dedicated to Yanbian-themed games, trojanizing both Windows and Android components with the BirdCall backdoor. The Windows client received malicious updates leading to RokRAT and subsequently BirdCall deployment, while Android games were directly trojanized. This marks the first discovery of Android BirdCall, capable of comprehensive surveillance including data collection, screenshots, and voice recording. The campaign focuses on espionage against individuals of interest to the North Korean regime, particularly refugees and defectors.

    Pulse ID: 69f9c539da459757922d22d8
    Pulse Link: otx.alienvault.com/pulse/69f9c
    Pulse Author: AlienVault
    Created: 2026-05-05 10:23:53

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Android #BackDoor #China #CyberSecurity #Espionage #InfoSec #Korea #NorthKorea #OTX #OpenThreatExchange #RAT #ScarCruft #Trojan #Windows #bot #AlienVault

  2. Happy Tuesday everyone!

    #APT37, aka #ScarCruft, is at it again! SentinelOne researchers noticed that they are targeting media organizations and others that are associated with North Korean affairs. The group leverages .LNK files, zip files, and phishing emails.

    I found this article most interesting because of the multiple types of file formats that were used, to include .bat and .dat files, involved in the campaign. They also use a custom backdoor known as #RokRat to aid in their attack. This is a great article and worth the time! Enjoy and Happy Hunting!

    Notable MITRE ATT&CK TTPs and Behaviors:
    TA0001 - Initial Access
    T1566.001 - Phishing: Spearphishing Attachment

    TA0002 - Execution
    T1059.001 - Command And Scripting Interpreter: Powershell
    T1204.001 - User Execution: Malicious Link

    sentinelone.com/labs/a-glimpse

    #CyberSecurity #ITSecurity #InfoSec #BlueTeam #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday #gethunting

  3. Die vom nordkoreanischen Staat gesponserte Hackergruppe #ScarCruft (#APT37) hat die IT-Infrastruktur und den E-Mail-Server von NPO Mashinostroyeniya gehackt.

    NPO Mashinostroyeniya ist ein russischer Konstrukteur und Hersteller von Orbitalfahrzeugen, Raumfahrzeugen und taktischen Verteidigungs- und Angriffsraketen, die von der russischen und indischen Armee eingesetzt werden.

    #hack #russland #nordkorea #Opencarrot #windows

    bleepingcomputer.com/news/secu

    golem.de/news/angriff-aus-nord