SmartTube YouTube app for Android TV breached to push malicious update
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内,并且直接写描述,不需要开头。首先,我得仔细阅读文章内容,抓住关键点。 文章讲的是SmartTube这个开源的YouTube客户端被攻击了。攻击者获取了开发者的签名密钥,导致恶意更新被推送给了用户。Play Protect检测到问题并警告用户。开发者Yuriy Yuliskov承认密钥被泄露,导致恶意软件注入应用。他撤销了旧签名,并计划发布新版本,但新版本还没到GitHub。用户发现注入了一个隐藏的库libalphasdk.so,可能用于收集设备信息和远程控制。虽然目前没发现恶意行为,但风险很高。开发者还没详细说明事件经过,导致信任问题。建议用户使用旧版本,并更改密码。 现在要总结这些内容,控制在100字以内。我需要涵盖攻击事件、影响、开发者应对措施以及建议。 可能的结构:SmartTube因开发者密钥泄露被攻击,恶意软件注入应用,导致安全风险。Play Protect检测到问题。开发者撤销签名并计划发布新版本,但未公开详细信息。建议用户使用旧版本并更改密码。 检查字数是否在限制内,并确保信息准确。 </think> SmartTube开源YouTube客户端因开发者签名密钥泄露遭攻击,恶意软件注入应用引发安全风险。Play Protect检测到异常后警告用户。开发者撤销旧签名并计划发布新版本以应对问题,但未公开详细信息。建议用户使用已知安全的旧版本,并采取额外安全措施以防范潜在风险。 2025-12-1 19:0:27 Author: www.bleepingcomputer.com(查看原文) 阅读量:10 收藏

SmartTube

The popular open-source SmartTube YouTube client for Android TV was compromised after an attacker gained access to the developer's signing keys, leading to a malicious update being pushed to users.

The compromise became known when multiple users reported that Play Protect, Android's built-in antivirus module, blocked SmartTube on their devices and warned them of a risk.

The developer of SmartTube, Yuriy Yuliskov, admitted that his digital keys were compromised late last week, leading to the injection of malware into the app.

Yuliskov revoked the old signature and said he would soon publish a new version with a separate app ID, urging users to move to that one instead.

SmartTube is one of the most widely downloaded third-party YouTube clients for Android TVs, Fire TV sticks, Android TV boxes, and similar devices.

Its popularity stems from the fact that it is free, can block ads, and performs well on underpowered devices.

A user who reverse-engineered the compromised SmartTube version number 30.51 found that it includes a hidden native library named libalphasdk.so [VirusTotal]. This library does not exist in the public source code, so it is being injected into release builds.

"Possibly a malware. This file is not part of my project or any SDK I use. Its presence in the APK is unexpected and suspicious. I recommend caution until its origin is verified," cautioned Yuliskov on a GitHub thread.

The library runs silently in the background without user interaction, fingerprints the host device, registers it with a remote backend, and periodically sends metrics and retrieves configuration via an encrypted communications channel.

All this happens without any visible indication to the user. While there's no evidence of malicious activity such as account theft or participation in DDoS botnets, the risk of enabling such activities at any time is high.

Although the developer announced on Telegram the release of safe beta and stable test builds, they have not reached the project's official GitHub repository yet.

Also, the developer has not provided full details of what exactly happened, which has created trust issues in the community.

Yuliskov promised to address all concerns once the final release of the new app is pushed to the F-Droid store.

Until the developer transparently discloses all points publicly in a detailed post-mortem, users are recommended to stay on older, known-to-be-safe builds, avoid logging in with premium accounts, and turn off auto-updates.

Impacted users are also recommended to reset their Google Account passwords, check their account console for unauthorized access, and remove services they don't recognize.

At this time, it is unclear exactly when the compromise occurred or which versions of SmartTube are safe to use. One user reported that Play Protect doesn't flag version 30.19, so it appears safe.

BleepingComputer has contacted Yuliskov to determine which versions of the SmartTube app were compromised, but a comment hasn't been available yet.

tines

Break down IAM silos like Bitpanda, KnowBe4, and PathAI

Broken IAM isn't just an IT problem - the impact ripples across your whole business.

This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what "good" IAM looks like, and a simple checklist for building a scalable strategy.


文章来源: https://www.bleepingcomputer.com/news/security/smarttube-youtube-app-for-android-tv-breached-to-push-malicious-update/
如有侵权请联系:admin#unsafe.sh