Android TV box on Amazon came pre-installed with malware

Android TV box on Amazon came pre-installed with malware


A Canadian systems security consultant discovered that an Android TV box purchased from Amazon was pre-loaded with persistent, sophisticated malware baked into its firmware.


The malware was discovered by Daniel Milisic, who created a script and instructions to help users nullify the payload and stop its communication with the C2 (command and control) server.


The device in question is the T95 Android TV box with an AllWinner T616 processor, widely available through Amazon, AliExpress, and other big e-commerce platforms.


It is unclear if this single device was affected or if all devices from this model or brand include the malicious component.


Malware on the TV streaming box


The T95 streaming device uses an Android 10-based ROM signed with test keys and the ADB (Android Debug Bridge) open over Ethernet and WiFi.


This is a suspicious configuration as ADB can be used to connect to devices for unrestricted filesystem access, command execution, software installation, data modification, and remote control. 


However, as most consumer streaming devices sit behind a firewall, threat actors will likely be unable to connect to ADB remotely.


Milisic says he initially bought this device to run the Pi-hole DNS sinkhole, which protects devices from unwanted content, advertisements, and malicious sites without installing software.


While analyzing the DNS request in Pi-hole, Milisic discovered that the device was attempting to connect to several IP addresses associated with active malware.



List of malicious domains T95 attempts to ..

Support the originator by clicking the read the rest link below.