{"id":168342,"date":"2024-09-13T09:58:59","date_gmt":"2024-09-13T09:58:59","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=168342"},"modified":"2024-09-13T09:59:02","modified_gmt":"2024-09-13T09:59:02","slug":"vo1d-android-malware-tv-boxes","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/168342\/malware\/vo1d-android-malware-tv-boxes.html","title":{"rendered":"Vo1d malware infected 1.3 Million Android-based TV Boxes in 197 countries"},"content":{"rendered":"
<\/div>\n

Researchers uncovered an Android malware, dubbed\u00a0Vo1d, that has already infected nearly 1.3 million Android devices in 197 countries. <\/h2>\n\n\n\n

Doctor Web researchers uncovered a malware, tracked as Vo1d<\/a>, that infected nearly 1.3 million Android-based TV boxes belonging to users in 197 countries. The malicious code acts as a backdoor and allows attackers to download and install third-party software secretly.<\/gwmw><\/p>\n\n\n\n

In August 2024, several users reported that Dr.Web antivirus detected changes in their TV box system files. The problems were observed in several models, including the R4 (Android 7.1.2), TV BOX (Android 12.1), and KJ-SMART4KVIP (Android 10.1). The indicators of compromise are similar in all cases, with modifications to system files like install-recovery.sh<\/em> and daemonsu<\/em>. Additionally, four new files appeared: vo1d<\/em>, wd<\/em>, debuggerd<\/em>, and debuggerd_real<\/em>. The vo1d<\/em> and wd<\/em> files were identified as components of Vo1d Android trojan.<\/gwmw><\/p>\n\n\n\n

“The\u00a0install-recovery.sh\u00a0file is a script that is present on most Android devices. It runs when the operating system is launched and contains data for autorunning the elements specified in it.” reads the report<\/a> published by Doctor Web. “If any malware has root access and the ability to write to the\u00a0\/system\u00a0system directory, it can anchor itself in the infected device by adding itself to this script (or by creating it from scratch if it is not present in the system).\u00a0Android.Vo1d<\/strong><\/a>\u00a0has registered the autostart for the\u00a0wd\u00a0component in this file.”<\/em><\/p>\n\n\n

\n
\"Vo1d<\/a><\/figure><\/div>\n\n\n

The experts reported that the geographical distribution of the infections included almost 200 countries. The largest number of infections was reported in Brazil, Morocco, Pakistan, Saudi Arabia, Russia, Argentina, Ecuador, Tunisia, Malaysia, Algeria, and Indonesia.<\/gwmw><\/p>\n\n\n\n

Doctor Web observed that attackers target TV boxes because these devices often run outdated Android versions with unpatched vulnerabilities and lack updates. Many users reported devices labeled as running Android 10 or 12, but they were actually using Android 7.1. Unfortunately, often manufacturers sell older OS versions as newer ones. Users may also mistakenly believe TV boxes are more secure than smartphones and are less likely to install antivirus software, increasing their risk when downloading third-party apps or unofficial firmware. The infection source is still unknown but experts believe that is could involve malware exploiting OS vulnerabilities or unofficial firmware with built-in root access.<\/p>\n\n\n\n

“Unfortunately, it is not uncommon for budget device manufacturers to utilize older OS versions and pass them off as more up-to-date ones to make them more attractive,” concludes the report that also includes Indicators of Compromise<\/a>.<\/em><\/gwmw><\/gwmw><\/gwmw><\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n

Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, Android-based TV boxes<\/a>)<\/strong><\/gwmw><\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"

Researchers uncovered an Android malware, dubbed\u00a0Vo1d, that has already infected nearly 1.3 million Android devices in 197 countries. Doctor Web researchers uncovered a malware, tracked as Vo1d, that infected nearly 1.3 million Android-based TV boxes belonging to users in 197 countries. The malicious code acts as a backdoor and allows attackers to download and install […]<\/p>\n","protected":false},"author":1,"featured_media":168346,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,4966,7],"tags":[15364,88,4112,9508,9506,1693,10918,30,687,841,1533,15363],"class_list":["post-168342","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-iot","category-malware","tag-android-based-tv-boxes","tag-cybercrime","tag-hacking","tag-hacking-news","tag-information-security-news","tag-iot","tag-it-information-security","tag-malware-2","tag-pierluigi-paganini","tag-security-affairs","tag-security-news","tag-vo1d-android-malware"],"yoast_head":"\n杭州江阴科强工业胶带有限公司