Neue Vo1d-Malware infiziert 1,3 Millionen Android-Streaming-Boxen

Teilen:

Threat actors have infected over 1.3 million TV streaming boxes running Android with a new Vo1d backdoor malware, allowing the attackers to take full control of the devices.

The Android Open Source Project (AOSP) is an open source operating system led by Google that can be used on mobile, streaming, and IoT devices.

In a new report by Dr.Web, researchers found 1.3 million devices infected with the Vo1d malware in over 200 countries, with the largest number detected in Brazil, Morocco, Pakistan, Saudi Arabia, Russia, Argentina, Ecuador, Tunisia, Malaysia, Algeria, and Indonesia.

Geographic distribution of Vo1d-infected TV boxes
Geographic distribution of Vo1d-infected TV boxes
Source: Dr.Web

The Android firmware seen being targeted in this malware campaign include:

  • Android 7.1.2; R4 Build/NHG47K
  • Android 12.1; TV BOX Build/NHG47K
  • Android 10.1; KJ-SMART4KVIP Build/NHG47K

Depending on the version of the Vo1d malware installed, the campaign will modify the install-recovery.shdaemonsu, or replace the debuggerd operating system files, all of which are startup scripts commonly found in Android.

Modified install-recovery.sh file
Modified install-recovery.sh file
Source: Dr.Web

The malware campaign uses these scripts for persistence and to launch the Vo1d malware on boot.

The Vo1d malware itself is located in the files wd und vo1d, which the malware is named after.

“Android. Vo1d’s main functionality is concealed in its vo1d (Android.Vo1d.1) and wd (Android.Vo1d.3) components, which operate in tandem,” explains Dr.Web.

ADVERTISING

“The Android.Vo1d.1 module is responsible for Android. Vo1d.3’s launch and controls its activity, restarting its process if necessary. In addition, it can download and run executables when commanded to do so by the C&C server.”

“In turn, the Android.Vo1d.3 module installs and launches the Android.Vo1d.5 daemon that is encrypted and stored in its body. This module can also download and run executables. Moreover, it monitors specified directories and installs the APK files that it finds in them.”

While Dr.Web does not know how Android streaming devices are being compromised, researchers believe they are targeted because they commonly run outdated software with vulnerabilities.

“One possible infection vector could be an attack by an intermediate malware that exploits operating system vulnerabilities to gain root privileges,” concludes Dr.Web.

“Another possible vector could be the use of unofficial firmware versions with built-in root access.”

To prevent infection by this malware, it is advised that Android users check for and install new firmware updates as they become available. Also be sure to remove these boxes from the internet in case they are being remotely exploited through exposed services.

Last but not least, avoid installing Android applications as APKs from third-party sites on Android as they are a common source of malware.

A list of IOCs for the Vo1d malware campaign can be found on Dr. Web’s GitHub page.

Update 9/12/24: Google told BleepingComputer that the infected devices are not running Android TV but are instead using the Android Open Source Project (AOSP).

“These off-brand devices discovered to be infected were not Play Protect certified Android devices. If a device isn’t Play Protect certified, Google doesn’t have a record of security and compatibility test results. Play Protect certified Android devices undergo extensive testing to ensure quality and user safety. To help you confirm whether or not a device is built with Android TV OS and Play Protect certified, our Android TV website provides the most up-to-date list of partners. You can also take these steps to check if your device is Play Protect certified.” – A Google spokesperson.

The article has been updated to reflect that they are not running Android TV, which is only used by Google and its licensed partners.

Lawrence Abrams

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
7:38 pm, Jan. 24, 2025
Wetter-Symbol 8°C
L: 7° | H: 9°
overcast clouds
Luftfeuchtigkeit: 74 %
Druck: 1000 mb
Wind: 7 mph S
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 100%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 7:49 am
Sonnenuntergang: 4:35 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 9:00 pm
Wetter-Symbol
7° | 9°°C 0 mm 0% 8 mph 74 % 1000 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
3° | 8°°C 1 mm 100% 7 mph 93 % 1010 mb 0 mm/h
So. Jan. 26 9:00 pm
Wetter-Symbol
2° | 8°°C 1 mm 100% 16 mph 91 % 1009 mb 0 mm/h
Mo. Jan. 27 9:00 pm
Wetter-Symbol
6° | 8°°C 1 mm 100% 23 mph 92 % 983 mb 0 mm/h
Di. Jan. 28 9:00 pm
Wetter-Symbol
8° | 9°°C 1 mm 100% 20 mph 84 % 995 mb 0 mm/h
Today 9:00 pm
Wetter-Symbol
6° | 8°°C 0 mm 0% 8 mph 74 % 1000 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
7° | 8°°C 0 mm 0% 5 mph 77 % 1000 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
6° | 7°°C 0 mm 0% 4 mph 85 % 999 mb 0 mm/h
Tomorrow 6:00 am
Wetter-Symbol
3° | 3°°C 1 mm 100% 7 mph 93 % 1001 mb 0 mm/h
Tomorrow 9:00 am
Wetter-Symbol
5° | 5°°C 0.59 mm 59% 6 mph 73 % 1004 mb 0 mm/h
Tomorrow 12:00 pm
Wetter-Symbol
6° | 6°°C 0.22 mm 22% 7 mph 55 % 1006 mb 0 mm/h
Tomorrow 3:00 pm
Wetter-Symbol
6° | 6°°C 0 mm 0% 4 mph 56 % 1008 mb 0 mm/h
Tomorrow 6:00 pm
Wetter-Symbol
4° | 4°°C 0 mm 0% 3 mph 70 % 1009 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€101,411.74
1.61%
Ethereum(ETH)
€3,233.23
5.50%
XRP(XRP)
€3.00
2.38%
Fesseln(USDT)
€0.95
0.00%
Solana(SOL)
€250.52
6.08%
Dogecoin(DOGE)
€0.342785
3.58%
USDC(USDC)
€0.95
0.00%
Shiba Inu(SHIB)
€0.000019
2.71%
Pepe(PEPE)
€0.000015
7.69%
Peanut das Eichhörnchen(PNUT)
€0.341906
3.03%
Nach oben scrollen