APK

BetaBeacon
May 6, 2026
- ScarCruft, also known as APT37 or Reaper, is a North Korean espionage group targeting government, military organizations, and companies in Asia. - BirdCall is a Windows backdoor attributed to ScarCruft, with spying capabilities such as taking screenshots and logging keystrokes. - The Android version of BirdCall collects contacts, SMS messages, call logs, and media files, and was actively developed over several months. - The BirdCall backdoor was discovered in a trojanized card game on a gaming platform tailored for ethnic Koreans living in Yanbian, China. - The attack was likely aimed at collecting information on individuals from the Yanbian region deemed of interest to the North Korean regime, such as refugees or defectors.
BetaBeacon
May 5, 2026
ScarCruft compromised a video game platform in a supply chain attack, trojanizing its components with a backdoor called BirdCall to target ethnic Koreans residing in China. The attack enabled the threat actors to target both Windows and Android devices, turning it into a multi-platform threat. The campaign targeted sqgame[.]net, a gaming platform used by ethnic Koreans in China, known as a transit point for North Korean defectors. BirdCall has features like screenshot capture, keystroke logging, and data gathering, and relies on legitimate cloud services for command-and-control. The Android variant collects various data and has seen active development.
AppWizard
May 5, 2026
A fraud network called FEMITBOT has emerged, using Telegram's Mini App feature to conduct investment scams and distribute malware. Identified by the research firm CTM360, the network operates through API responses and presents itself as organized. The scams involve Telegram Mini Apps that display phishing pages, fake dashboards showing fictitious earnings, and urgency tactics to pressure users into making quick decisions. FEMITBOT mimics well-known brands like Apple and Coca-Cola to enhance credibility and disseminates Android malware disguised as legitimate applications. The operation is highly organized, utilizing marketing tools to optimize their scams. Users are warned to be cautious of bots requesting deposits before granting access to funds.
AppWizard
May 5, 2026
A North Korean hacking group has targeted a digital gaming platform popular among the Korean ethnic enclave in China, using a sophisticated strategy to infiltrate Android applications. Researchers from Eset discovered that an app on the platform contained a backdoor known as BirdCall, linked to North Korea. The official website for the gaming platform hosted the same suspicious APK file. A second Android file associated with another game on the same site was also found to contain the BirdCall backdoor. This supply-chain attack was attributed to the threat actor ScarCruft (APT37), active in Asia and extending into Europe and the Middle East since late 2024. The hackers likely compromised the web server to recompile original APKs with the backdoor, which can collect sensitive information such as contacts, SMS messages, call logs, documents, media files, and private keys, and can take screenshots and record audio. The malware disguises its command and control traffic among regular internet traffic, primarily using Zoho WorkDrive for operations.
AppWizard
May 4, 2026
Google Play is a primary platform for Android app distribution but poses challenges for developers of free and open-source software due to registration fees and a strict review process. As an alternative, users can install apps via APK files, which allow direct installation but come with security risks. F-Droid is a dedicated repository for free and open-source Android applications, offering built-in update notifications and support. To use F-Droid, users must manually install the app from its official website. After installation, users can navigate the interface to find and install apps, grant permissions for updates, and manage app installations, including enabling settings for unknown sources. F-Droid provides a user-friendly experience for locating and updating apps, ensuring that users have access to secure and regularly updated software.
AppWizard
April 30, 2026
Google is preparing to update the Gemini app for Wear OS with the "Gemini App UX 2.0," featuring animated gradient backgrounds and an enhanced user interface. A retail demo video has revealed a new glow animation and updated weather icons, although these features are not yet publicly available. The latest version of the Gemini app is v1.31.56.902760379. The new glow animation is designed to be more dynamic, and the updated weather icons aim to improve clarity and aesthetics. A full demo video showcases these upcoming changes, but they will remain unreleased until an official announcement, likely at the Google I/O event. An APK teardown suggests potential future features, though not all may be included in the final release.
Search