Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

955+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. North Korean APT37 Targets Ethnic Koreans in China with Android BirdCall Backdoor
North Korean APT37 Targets Ethnic Koreans in China with Android BirdCall Backdoor
NEWS

North Korean APT37 Targets Ethnic Koreans in China with Android BirdCall Backdoor

ESET researchers attribute a targeted Android malware campaign to APT37, using a trojanized card game app from 'Sqgame' to deploy the BirdCall backdoor against ethnic Korean communities in China.

Dylan H.

News Desk

May 7, 2026
4 min read

Researchers at cybersecurity firm ESET have attributed a sophisticated Android surveillance campaign to the North Korean state-sponsored hacking group APT37, also known as Ricochet Chollima. The campaign deployed a custom backdoor called BirdCall, hidden inside trojanized card game applications distributed by a company called Sqgame, targeting the ethnic Korean diaspora in China.

Who Is APT37?

APT37 (also tracked as Reaper, Group123, ScarCruft, and Ricochet Chollima) is a threat actor widely attributed to North Korea's Reconnaissance General Bureau. Unlike APT38 which focuses on financial theft, APT37's primary mandate is intelligence collection — particularly targeting individuals and organizations of political interest to Pyongyang.

Historical APT37 campaigns have targeted:

  • South Korean government officials and journalists
  • North Korean defectors
  • Human rights organizations
  • Members of the Korean diaspora abroad

The targeting of ethnic Koreans in China — known as the Joseonjok community — is consistent with APT37's historical interest in monitoring Korean-speaking populations outside the peninsula who may have connections to defector networks or South Korean interests.

The BirdCall Backdoor

The malware, dubbed BirdCall by ESET, is a full-featured Android backdoor distributed by embedding it inside legitimate-looking card game apps attributed to a company called Sqgame. The games themselves appear functional, reducing suspicion while the backdoor operates silently in the background.

Capabilities

Based on ESET's analysis, BirdCall is capable of:

CapabilityDescription
Contact harvestingExfiltrates the victim's full contact list
SMS interceptionReads incoming and outgoing text messages
Call loggingRecords call history including numbers and timestamps
Location trackingContinuously reports GPS coordinates to the C2 server
File exfiltrationUploads targeted files from device storage
Microphone recordingCaptures ambient audio on demand
Photo theftAccesses and exfiltrates camera photos
App inventoryEnumerates installed applications

Command and Control

BirdCall communicates with attacker-controlled infrastructure using encrypted channels, making traffic analysis challenging. The use of a card game theme provides social cover — users are less likely to notice battery drain or unusual network activity if they believe a game is running.

Distribution Method

The campaign used a supply chain-style deception: the malicious app was distributed through channels frequented by the Joseonjok community, potentially including:

  • Third-party Android app stores popular in China (Google Play is not available in mainland China)
  • Community forums and social media groups
  • Direct messaging via platforms like WeChat or Telegram

The use of a gaming app as a delivery vehicle is a well-documented APT37 tactic — the group has previously used utilities like document readers and media players as trojan carriers.

Geopolitical Context

The targeting of ethnic Koreans in China carries significant geopolitical implications. China's Korean minority (approximately 2 million people, primarily in Jilin Province and Yanbian Korean Autonomous Prefecture) often serve as intermediaries for contact between North Korean defectors and South Korean NGOs. North Korea has a strong interest in mapping these networks.

This campaign likely serves multiple intelligence objectives:

  • Identifying defector support networks that operate through China
  • Monitoring communications between the diaspora and South Korean entities
  • Tracking individuals who may be assisting defectors attempting to reach South Korea through China

Detection and Defense

For Individuals

  • Only install apps from Google Play (where available) or verified official sources
  • Review app permissions before installation — a card game should not require access to contacts, SMS, microphone, or location
  • Use a mobile security product capable of detecting Android malware
  • Be suspicious of apps distributed through informal channels, regardless of apparent legitimacy

For Organizations

  • Deploy Mobile Device Management (MDM) solutions with app allowlisting
  • Monitor for unusual data exfiltration patterns from mobile devices on corporate networks
  • Brief staff on social engineering via mobile apps, particularly in regions with geopolitical risk

Indicators of Compromise

Organizations and individuals who believe they may have been targeted should consult ESET's published threat intelligence for specific file hashes, C2 domains, and network indicators associated with BirdCall.

ESET Attribution

ESET's attribution to APT37 is based on overlapping infrastructure, code similarities with previously documented APT37 tooling, and the targeting profile being consistent with the group's known intelligence collection mandate. The Sqgame app distribution mechanism aligns with the group's previous use of seemingly legitimate app developers as a distribution front.

References

  • The Record — North Korean hackers target ethnic Koreans in China
  • ESET Research — APT37 Threat Profile
  • MITRE ATT&CK — APT37
#Malware#Android#APT#China#North Korea#APT37#BirdCall#Espionage

Related Articles

Silver Fox APT Hits India, Russia With ABCDoor Phishing

China-linked Silver Fox is running tax-themed spear-phishing against orgs in India and Russia, dropping the new ABCDoor backdoor alongside ValleyRAT.

6 min read

Three China-Linked Clusters Target Southeast Asian Government in 2025 Cyber Campaign

Three threat activity clusters aligned with China jointly targeted a Southeast Asian government organization in a complex, well-resourced espionage...

5 min read

Google Disrupts Massive Chinese Espionage Campaign

Google's Threat Intelligence Group dismantles UNC2814, a China-linked operation that deployed a novel backdoor called GRIDTIDE abusing Google Sheets API...

3 min read
Back to all News