Infection corrals devices running AOSP-based firmware into a botnet.

  • reddig33@lemmy.world
    link
    fedilink
    English
    arrow-up
    40
    ·
    2 months ago

    Gee, I bought this cheap made in China Android TV thing off Ali express, and I just can’t figure out how this backdoor got in here…

  • BoyetLeonantus@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    15
    ·
    2 months ago

    RethinkDNS (available on F-Droid) has a mode where it blocks every connection by default and you have to allow each app to access the network. I used that to effectively disable the pre-installed malware on my Android TV box (X88 Pro iirc). It also has DNS and connection logs to check network traffic (can be a lot though). GlassWire (Play Store) is nice to quickly check for an unexpected amount of network traffic. Not sure if there’s ways around that, but it worked in my case a while ago.

    • pandapoo@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      7
      ·
      2 months ago

      I’m guessing very few, if any, Play Store certified devices are on that list. Unless Google has really laxed requirements.

      Either way, Xaomi devices might get a CCP backdoor, but probably not an ordinary botnet like this.

        • pandapoo@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          3
          ·
          edit-2
          2 months ago

          Xaomi is a good brand, until proven otherwise.

          I was just giving a broad disclaimer, but mostly I was trying to highlight that they aren’t some random shady white box OEM that gets re-sold under 72 different brand names.

          They are a well established brand that produces quality products, that happens to be based in China, and therefore subject to Chinese laws and regulations.

  • Admiral Patrick@dubvee.org
    link
    fedilink
    English
    arrow-up
    4
    ·
    2 months ago

    Further, while only licensed device makers are permitted to modify Google’s AndroidTV, any device maker is free to make changes to open source versions. That leaves open the possibility that the devices were infected in the supply chain and were already compromised by the time they were purchased by the end user.

    It’s ArsTechnica, so I wouldn’t think they’re intentionally spreading FUD around FOSS, but that bit did live a bad taste in my mouth.

  • dingdongitsabear@lemmy.ml
    link
    fedilink
    English
    arrow-up
    2
    ·
    2 months ago

    this is a nothing-burger. the same “article” from days ago, rehashing the same bullshit, quoting a totally unknown security researcher firm (that, conveniently, also sells some turd that’s gonna rid you of this scourge) with zero details, followed with less than zero fact checking from arse technica, like how did they establish the 1.3 milsky number, the “infection” vector and other similarly “unimportant” shit.

    portals like the mentioned arse thing are hungry for content and are willing to publish any old thing that even resembles quality content. keep your eyes open, your wits about you, and question everything.