this post was submitted on 02 Dec 2025
14 points (100.0% liked)

Cybersecurity

9753 readers
52 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !securitynews@infosec.pub !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 2 years ago
MODERATORS
 

cross-posted from: https://lemmy.today/post/42851505

Slightly more detail in this GitHub issue, however much is still unknown, even after three or so days. The dev hasn't revealed any further details. Some articles on this incident:

Note that the articles provide little detail on what's happened, mostly just detail that a malicious library was found and Play Protect started removing the app if affected. It's unclear which versions are specifically affected, how the dev got breached, and what the malware actually does. According to a user (who may or may not be using some sort of LLM, their comment sounds like one at least) in a separate, related issue, the malware may collect device info and send to a command & control server. It could (in theory) receive new instructions at any point if it's a C2 server. Again, it does appear that they had an LLM of some sort generate their comment, so take it with a grain of salt.

I'm going to uninstall the app and revoke access on my Google account page. I see little reason to need to reset my password as of right now, since the app uses an API key and not my actual password. In my opinion, it's possibly related to YT viewbotting and commenting, or to add your device to a botnet. It's unclear to me how this botnet would work in practice, since even Android TV sandboxes apps (for the most part).

Update: it appears that this may be related to the Vo1d botnet: DrWeb: Android.Vo1d.14.origin. If this is indeed the case, then the goal was to add devices to the botnet. It's my understanding that previous versions of this botnet typically required cheap, pre-rooted Android TV boxes, in order to install other apps. I'm not sure if that means that you're safe if your device is not rooted. It might be worth checking your installed apps for oddities.

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here