Malicious Code: The Dangers of Pirated Apps for TVs

Set-top boxes with root access are especially vulnerable

Pirated apps for watching movies and TV shows via TV set-top boxes may include malicious code. It can penetrate the system and disrupt its operation, according to Yuliy Shabalin, Product Director at Stingray, AppSec Solutions.

Cybersecurity experts have begun studying applications of online cinemas, TV channels, games, and music services. Initial checks showed that there are no fewer vulnerabilities in such applications than in regular smartphone applications. However, they have their own technical features.

Bad news for those who like to download pirated apps for watching movies and TV shows – dubious apps may contain malicious code that can penetrate the entire system, especially when using inexpensive Android set-top boxes.
Yuliy Shabalin, Product Director at Stingray, AppSec Solutions

Set-top boxes with root access are especially vulnerable. This access allows the user to control all system processes and programs, which can be used for various purposes. Root access is most common in Android set-top boxes. Owners of such devices are more exposed to risks to personal data and other applications, especially if they are installed from unofficial sources.

One of the installed applications may contain additional functionality that allows hackers to gain remote access to the device and make it, for example, part of a botnet network or gain access to the official application to which the user's bank card is linked.
Yuliy Shabalin, Product Director at Stingray, AppSec Solutions

The specialist noted that in situations where the set-top box is integrated into the "smart home" system, attackers have more ways to cause damage.

Earlier it became known that almost half of the programs that replaced iOS applications are dangerous. The programs are extremely poorly protected from hackers, and access to data in them can be obtained without permission.

Read more on the topic:

Why is biometrics needed in popular applications and how can a new level of protection create a risk of data leakage?

Digital crypt: how long do companies store your data on servers

Roskomnadzor stated that they do not collect data to track user activity