TechAndroid malware hits 1.3 million Smart TV sticks globally

Android malware hits 1.3 million Smart TV sticks globally

Security experts have reported on the malware Android.Vo1d, which has affected nearly 1.3 million smart TV sticks based on the Android TV system. The issue is global: infected devices have been detected in almost 200 countries.

Android TV
Android TV
Images source: © Dobreprogramy | Oskar Ziomek

12:13 PM EDT, September 13, 2024

The vulnerability in Android TV's security was identified by researchers from Dr.WEB. The malware Android.Vo1d can remotely download and install additional third-party software or access device memory thanks to root access. According to Dr.WEB, the issue was detected in three models of smart TV sticks: R4 with Android 7.1.2, TV BOX with Android 12.1, and KJ-SMART4KVIP with Android 10.1.

Interestingly, the Android.Vo1d software operates through several modules that are responsible for different functions—for example, the Android.Vo1d.1 module is used to download, install, and control the operations of another module (Android.Vo1d.3), which launches yet another module capable of downloading external software, running executable files, and installing APK packages.

Countries with the highest number of Android.Vo1d software infections
Countries with the highest number of Android.Vo1d software infections© dr.web

In other words, the software’s operation is complex and can lead to data theft from the smart TV stick and other attacks. These devices are usually connected to the main home network and do not receive frequent Android security updates. Thus, once attackers successfully infect a device, they have numerous opportunities for exploitation.

Researchers from Dr.WEB noted that the source of the Android.Vo1d malware is not yet known. It appears that user negligence may have played a role in the successful infections of some Android TV sticks. Infections were recorded on devices with Android TV 7.1, despite newer versions of the system being available. Installing the latest updates could help reduce the impact of this malware.

Related content
© essanews.com
·

Downloading, reproduction, storage, or any other use of content available on this website—regardless of its nature and form of expression (in particular, but not limited to verbal, verbal-musical, musical, audiovisual, audio, textual, graphic, and the data and information contained therein, databases and the data contained therein) and its form (e.g., literary, journalistic, scientific, cartographic, computer programs, visual arts, photographic)—requires prior and explicit consent from Wirtualna Polska Media Spółka Akcyjna, headquartered in Warsaw, the owner of this website, regardless of the method of exploration and the technique used (manual or automated, including the use of machine learning or artificial intelligence programs). The above restriction does not apply solely to facilitate their search by internet search engines and uses within contractual relations or permitted use as specified by applicable law.Detailed information regarding this notice can be found  here.