New Vo1d malware infects 1.3 million Android streaming containers

0
27
New Vo1d malware infects 1.3 million Android streaming containers


New Vo1d malware infects 1.3 million Android streaming containers
Picture: Midjourney

Menace actors have contaminated over 1.3 million TV streaming containers working Android with a brand new Vo1d backdoor malware, permitting the attackers to take full management of the gadgets.

The Android Open Supply Venture (AOSP) is an open supply working system led by Google that can be utilized on cell, streaming, and IoT gadgets.

In a brand new report by Dr.Net, researchers discovered 1.3 million gadgets contaminated with the Vo1d malware in over 200 international locations, with the most important quantity detected in Brazil, Morocco, Pakistan, Saudi Arabia, Russia, Argentina, Ecuador, Tunisia, Malaysia, Algeria, and Indonesia.

Geographic distribution of Vo1d-infected TV boxes
Geographic distribution of Vo1d-infected TV containers
Supply: Dr.Net

The Android firmware seen being focused on this malware marketing campaign embrace:

  • Android 7.1.2; R4 Construct/NHG47K
  • Android 12.1; TV BOX Construct/NHG47K
  • Android 10.1; KJ-SMART4KVIP Construct/NHG47K

Relying on the model of the Vo1d malware put in, the marketing campaign will modify the install-recovery.sh, daemonsu, or substitute the debuggerd working system recordsdata, all of that are startup scripts generally present in Android.

Modified install-recovery.sh file
Modified install-recovery.sh file
Supply: Dr.Net

The malware marketing campaign makes use of these scripts for persistence and to launch the Vo1d malware on boot.

The Vo1d malware itself is situated within the recordsdata wd and vo1d, which the malware is called after.

“Android. Vo1d’s major performance is hid in its vo1d (Android.Vo1d.1) and wd (Android.Vo1d.3) elements, which function in tandem,” explains Dr.Net.

“The Android.Vo1d.1 module is liable for Android. Vo1d.3’s launch and controls its exercise, restarting its course of if needed. As well as, it might obtain and run executables when commanded to take action by the C&C server.”

“In flip, the Android.Vo1d.3 module installs and launches the Android.Vo1d.5 daemon that’s encrypted and saved in its physique. This module also can obtain and run executables. Furthermore, it screens specified directories and installs the APK recordsdata that it finds in them.”

Whereas Dr.Net doesn’t know the way Android streaming gadgets are being compromised, researchers consider they’re focused as a result of they generally run outdated software program with vulnerabilities.

“One attainable an infection vector might be an assault by an intermediate malware that exploits working system vulnerabilities to realize root privileges,” concludes Dr.Net.

“One other attainable vector might be using unofficial firmware variations with built-in root entry.”

To forestall an infection by this malware, it’s suggested that Android customers test for and set up new firmware updates as they develop into out there. Additionally make sure you take away these containers from the web in case they’re being remotely exploited via uncovered companies.

Final however not least, keep away from putting in Android functions as APKs from third-party websites on Android as they’re a typical supply of malware.

A listing of IOCs for the Vo1d malware marketing campaign will be discovered on Dr. Net’s GitHub web page.

Replace 9/12/24: Google informed BleepingComputer that the contaminated gadgets aren’t working Android TV however are as an alternative utilizing the Android Open Supply Venture (AOSP).

“These off-brand gadgets found to be contaminated weren’t Play Shield licensed Android gadgets. If a tool is not Play Shield licensed, Google doesn’t have a file of safety and compatibility check outcomes. Play Shield licensed Android gadgets endure intensive testing to make sure high quality and person security. That will help you affirm whether or not or not a tool is constructed with Android TV OS and Play Shield licensed, our Android TV web site supplies essentially the most up-to-date checklist of companions. You may also take these steps to test in case your gadget is Play Shield licensed.” – A Google spokesperson.

The article has been up to date to replicate that they don’t seem to be working Android TV, which is barely utilized by Google and its licensed companions.

Replace 9/12/24 Added extra info from Google.

LEAVE A REPLY

Please enter your comment!
Please enter your name here