1.3M Android-Based TV Boxes Backdoored; Researchers Still Don't Know How
Researchers found Android.Vo1d malware infecting 1.3 million Android TV boxes globally, exploiting outdated systems. The source is unknown, with significant infections in Brazil, Morocco, and Russia.
Read original articleResearchers have identified a malware infection affecting approximately 1.3 million Android-based TV boxes across nearly 200 countries. The malware, named Android.Vo1d, has compromised these devices by embedding malicious components in their system storage, allowing for future updates with additional malware. The security firm Doctor Web reported that the source of the infection remains unknown, although potential vectors include vulnerabilities in the operating system or the use of unofficial firmware. Infected devices are primarily running outdated versions of Android, which are more susceptible to exploits. Google noted that these devices are not Play Protect certified, meaning they lack the security and compatibility testing that certified devices undergo. The malware operates by modifying critical system files to ensure its persistence and can connect to an attacker-controlled server to download further malicious components. The geographic spread of infections is extensive, with significant numbers reported in countries such as Brazil, Morocco, and Russia. Doctor Web's antivirus software can detect and disinfect these infections, but users may need to install malware scanners to identify compromised devices.
- 1.3 million Android TV boxes infected with the Android.Vo1d malware.
- The source of the infection is still undetermined, with potential vectors including OS vulnerabilities and unofficial firmware.
- Infected devices are often running outdated Android versions, increasing their vulnerability.
- The malware modifies system files to maintain persistence and connect to attacker-controlled servers.
- Significant infection rates reported in countries like Brazil, Morocco, and Russia.
Related
Telegram zero-day allowed sending malicious Android APKs as videos
A zero-day vulnerability in Telegram for Android, named 'EvilVideo,' allowed attackers to send malicious APK payloads disguised as videos. The flaw was patched in version 10.14.5 after responsible disclosure. Users should update their app.
Telegram zero-day for Android allowed malicious files to masquerade as videos
Researchers found a zero-day exploit in Telegram for Android, named EvilVideo. Telegram fixed it in versions 10.14.5+. Attackers could send malicious files as videos. Exploit sold on forum. Patched version prevents automatic downloads. Threat actor unknown.
Mysterious family of malware hid in Google Play for years
A family of Android malware named Mandrake has been found in Google Play, evading detection for years. It steals credentials and executes malicious applications, highlighting challenges in malware detection.
Google Pixel Phones Have Unpatched Flaw in Hidden Android App
A serious vulnerability in nearly all Google Pixel phones, linked to the "Showcase.apk" app, allows remote code execution. Google plans to remove it, but Palantir has stopped using Android devices.
Void captures over a million Android TV boxes
Doctor Web reported that the Android.Vo1d malware has infected 1.3 million Android TV boxes worldwide, modifying system files for persistence, primarily affecting users in Brazil, Morocco, and Pakistan.
Related
Telegram zero-day allowed sending malicious Android APKs as videos
A zero-day vulnerability in Telegram for Android, named 'EvilVideo,' allowed attackers to send malicious APK payloads disguised as videos. The flaw was patched in version 10.14.5 after responsible disclosure. Users should update their app.
Telegram zero-day for Android allowed malicious files to masquerade as videos
Researchers found a zero-day exploit in Telegram for Android, named EvilVideo. Telegram fixed it in versions 10.14.5+. Attackers could send malicious files as videos. Exploit sold on forum. Patched version prevents automatic downloads. Threat actor unknown.
Mysterious family of malware hid in Google Play for years
A family of Android malware named Mandrake has been found in Google Play, evading detection for years. It steals credentials and executes malicious applications, highlighting challenges in malware detection.
Google Pixel Phones Have Unpatched Flaw in Hidden Android App
A serious vulnerability in nearly all Google Pixel phones, linked to the "Showcase.apk" app, allows remote code execution. Google plans to remove it, but Palantir has stopped using Android devices.
Void captures over a million Android TV boxes
Doctor Web reported that the Android.Vo1d malware has infected 1.3 million Android TV boxes worldwide, modifying system files for persistence, primarily affecting users in Brazil, Morocco, and Pakistan.