Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Smarttube Breach Pushes Malicious Update

December 2, 2025
Reading Time: 3 mins read
in Alerts
Glassworm Malware Strikes Again In VS Code

The popular open-source SmartTube YouTube client for Android TV experienced a significant security breach when an attacker managed to gain access to the developer’s signing keys. This unauthorized access allowed the malicious actor to push a compromised update to users, inserting malware into the application. The issue came to light when numerous users reported that Android’s built-in antivirus, Play Protect, blocked SmartTube on their devices and issued a risk warning. Developer Yuriy Yuliskov publicly acknowledged the compromise of his digital keys late last week, confirming that malware had been injected into the app’s distribution channel.

SmartTube holds a substantial user base, being one of the most widely used third-party YouTube clients for various streaming devices, including Android TVs, Fire TV sticks, and Android TV boxes. Its widespread adoption is due to its key benefits: it is entirely free, successfully blocks ads, and maintains good performance even on hardware with limited resources. Following the breach, Yuliskov revoked the compromised signature and announced plans to release a new, secure version under a separate application ID, strongly advising all current users to transition to this new version immediately for their safety.

Further investigation into the compromised version, specifically number 30.51, revealed critical details about the injected code. A user who reverse-engineered the application discovered a hidden native library named libalphasdk.so embedded within the build. This library is not present in the public source code, indicating it was forcibly injected into the release builds. Yuliskov himself expressed caution on a GitHub thread, stating, “Possibly a malware. This file is not part of my project or any SDK I use. Its presence in the APK is unexpected and suspicious. I recommend caution until its origin is verified.”

The functionality of the suspicious library is deeply concerning, as it operates silently in the background without requiring any user interaction. It fingerprints the host device, registers it with a remote backend server, and then periodically transmits performance metrics while receiving configuration updates via an encrypted communication channel. Although there is currently no concrete evidence of highly malicious actions like account theft or the application being co-opted into a DDoS botnet, the potential for these activities to be enabled at any point by the remote backend remains a high risk for users.

While the developer announced the release of safe beta and stable test builds via Telegram, these have not yet been reflected on the project’s official GitHub repository. The lack of a comprehensive explanation from the developer about the exact circumstances of the compromise has led to a noticeable decline in trust within the community. Yuliskov has committed to providing a detailed post-mortem and addressing all concerns once the final, new application release is made available on the F-Droid store. Until the developer provides full public transparency, users are strongly advised to remain on older, verified-safe builds, disable auto-updates, and avoid logging in with premium accounts. Furthermore, impacted users should reset their Google Account passwords, check their account console for any unauthorized access, and promptly remove any services they do not recognize. It remains unclear precisely when the security breach took place, but version 30.19 has been reported as safe by users since Play Protect does not flag it.

Reference:

  • Smarttube App Breach Used To Deliver A Malicious Update On Android Tv Devices As
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityDecember 2025
ADVERTISEMENT

Related Posts

Intellexa Leak Exposes Predator Zero Days

Silver Fox Spreads ValleyRAT In China

December 5, 2025
Intellexa Leak Exposes Predator Zero Days

Intellexa Leak Exposes Predator Zero Days

December 5, 2025
Hackers Exploit ArrayOS AG VPN Flaw

Hackers Exploit ArrayOS AG VPN Flaw

December 5, 2025
WordPress Elementor Addon Flaw Exploited

Record DDoS Linked To Massive Botnet

December 4, 2025
WordPress Elementor Addon Flaw Exploited

RSC Bugs Let Hackers Run Remote Code Now

December 4, 2025
WordPress Elementor Addon Flaw Exploited

WordPress Elementor Addon Flaw Exploited

December 4, 2025

Latest Alerts

Silver Fox Spreads ValleyRAT In China

Intellexa Leak Exposes Predator Zero Days

Hackers Exploit ArrayOS AG VPN Flaw

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Subscribe to our newsletter

    Latest Incidents

    ASUS Confirms Vendor Breach By Everest

    Marquis Breach Hits Over 780,000 People

    Leroy Merlin Reports Data Breach

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial