Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Smarttube Breach Pushes Malicious Update

December 2, 2025
Reading Time: 3 mins read
in Alerts
Glassworm Malware Strikes Again In VS Code

The popular open-source SmartTube YouTube client for Android TV experienced a significant security breach when an attacker managed to gain access to the developer’s signing keys. This unauthorized access allowed the malicious actor to push a compromised update to users, inserting malware into the application. The issue came to light when numerous users reported that Android’s built-in antivirus, Play Protect, blocked SmartTube on their devices and issued a risk warning. Developer Yuriy Yuliskov publicly acknowledged the compromise of his digital keys late last week, confirming that malware had been injected into the app’s distribution channel.

SmartTube holds a substantial user base, being one of the most widely used third-party YouTube clients for various streaming devices, including Android TVs, Fire TV sticks, and Android TV boxes. Its widespread adoption is due to its key benefits: it is entirely free, successfully blocks ads, and maintains good performance even on hardware with limited resources. Following the breach, Yuliskov revoked the compromised signature and announced plans to release a new, secure version under a separate application ID, strongly advising all current users to transition to this new version immediately for their safety.

Further investigation into the compromised version, specifically number 30.51, revealed critical details about the injected code. A user who reverse-engineered the application discovered a hidden native library named libalphasdk.so embedded within the build. This library is not present in the public source code, indicating it was forcibly injected into the release builds. Yuliskov himself expressed caution on a GitHub thread, stating, “Possibly a malware. This file is not part of my project or any SDK I use. Its presence in the APK is unexpected and suspicious. I recommend caution until its origin is verified.”

The functionality of the suspicious library is deeply concerning, as it operates silently in the background without requiring any user interaction. It fingerprints the host device, registers it with a remote backend server, and then periodically transmits performance metrics while receiving configuration updates via an encrypted communication channel. Although there is currently no concrete evidence of highly malicious actions like account theft or the application being co-opted into a DDoS botnet, the potential for these activities to be enabled at any point by the remote backend remains a high risk for users.

While the developer announced the release of safe beta and stable test builds via Telegram, these have not yet been reflected on the project’s official GitHub repository. The lack of a comprehensive explanation from the developer about the exact circumstances of the compromise has led to a noticeable decline in trust within the community. Yuliskov has committed to providing a detailed post-mortem and addressing all concerns once the final, new application release is made available on the F-Droid store. Until the developer provides full public transparency, users are strongly advised to remain on older, verified-safe builds, disable auto-updates, and avoid logging in with premium accounts. Furthermore, impacted users should reset their Google Account passwords, check their account console for any unauthorized access, and promptly remove any services they do not recognize. It remains unclear precisely when the security breach took place, but version 30.19 has been reported as safe by users since Play Protect does not flag it.

Reference:

  • Smarttube App Breach Used To Deliver A Malicious Update On Android Tv Devices As
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityDecember 2025
ADVERTISEMENT

Related Posts

Glassworm Malware Strikes Again In VS Code

Shadypanda Extensions Hit Millions Users

December 2, 2025
Glassworm Malware Strikes Again In VS Code

Glassworm Malware Strikes Again In VS Code

December 2, 2025
Albiriox Malware Hits Hundreds Of Apps

Google Meet Page Used To Deliver Malware

December 1, 2025
Tomiris Shifts To Public Service C2

Tomiris Shifts To Public Service C2

December 1, 2025
Albiriox Malware Hits Hundreds Of Apps

Albiriox Malware Hits Hundreds Of Apps

December 1, 2025
ShadowV2 Botnet Tests During AWS Outage

Bloody Wolf Widens Java RAT Campaign

November 28, 2025

Latest Alerts

Shadypanda Extensions Hit Millions Users

Smarttube Breach Pushes Malicious Update

Glassworm Malware Strikes Again In VS Code

Google Meet Page Used To Deliver Malware

Tomiris Shifts To Public Service C2

Albiriox Malware Hits Hundreds Of Apps

Subscribe to our newsletter

    Latest Incidents

    French Soccer Federation Suffers Cyberattack

    120,000 Cameras Hacked In South Korea

    Hackers Claim Mercedes Benz USA Breach

    Ecommerce Breach Exposes 34 Million

    Ransomware Hits Golf Manor Network

    Yearn Finance Hit By 9M Token Exploit

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial