Зловредный код: чем опасны пиратские приложения для телевизоров

Set-top boxes with root access are especially vulnerable

Pirated apps for watching movies and TV shows via TV set-top boxes may include malicious code. It can penetrate the system and disrupt its operation, according to Yuliy Shabalin, Product Director at AppSec Solutions' Stingray.

Cybersecurity experts have begun studying the applications of online cinemas, TV channels, games, and music services. Initial checks have shown that there are just as many vulnerabilities in such applications as in regular smartphone applications. However, they have their own technical features.

Bad news for those who like to download pirated apps for watching movies and TV shows – dubious apps may contain malicious code that can penetrate the entire system, especially when using inexpensive Android set-top boxes.
Yuliy Shabalin, Product Director at AppSec Solutions' Stingray

Set-top boxes with root access are especially vulnerable. This access allows the user to control all system processes and programs, which can be used for various purposes. Root access is most common in Android set-top boxes. Owners of such devices are more susceptible to risks to personal data and other applications, especially if they are installed from unofficial sources.

One of the installed applications may contain additional functionality that allows hackers to gain remote access to the device and make it, for example, part of a botnet network or gain access to the account of an official application to which the user's bank card is linked.
Yuliy Shabalin, Product Director at AppSec Solutions

The specialist noted that in situations where the set-top box is integrated into the "smart home" system, attackers have more ways to cause damage.

Earlier it became known that almost half of the programs that replaced applications for iOS are dangerous. The programs are extremely poorly protected from hackers, and access to the data in them can be obtained without permission.

Read more on the topic:

Why is biometrics needed in popular applications and how a new level of protection can create a risk of data leakage

Digital crypt: how long do companies store your data on servers

Roskomnadzor stated that they do not collect data to track user activity

Now on home