Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Malicious Update: A Vulnerability in SmartTube YouTube App Exposes Android TV Devices to Security Risks




The popular open-source SmartTube YouTube client for Android TV was compromised after an attacker gained access to the developer's signing keys, leading to a malicious update being pushed to users. The breach has raised concerns about potential security risks and the importance of developers prioritizing their users' safety and security.



  • SmartTube, a popular Android TV client, was breached due to compromised developer signing keys.
  • The malicious update injected malware into the app, exposing users to security risks.
  • The developer, Yuriy Yuliskov, revoked the old signature and published a new version with a separate app ID.
  • A hidden native library was found in compromised versions of SmartTube, which may contain malware.
  • Users are advised to use older known-safe builds, avoid logging in with premium accounts, and turn off auto-updates until the issue is resolved.



  • SmartTube, a popular and widely used third-party YouTube client for Android TVs, Fire TV sticks, Android TV boxes, and similar devices, has been breached by an attacker who gained access to the developer's signing keys. This breach led to the malicious update being pushed to users, exposing them to potential security risks.

    According to reports, multiple users reported that Play Protect, Android's built-in antivirus module, blocked SmartTube on their devices and warned them of a risk. The developer of SmartTube, Yuriy Yuliskov, admitted that his digital keys were compromised late last week, leading to the injection of malware into the app.

    Yuliskov revoked the old signature and stated that he would soon publish a new version with a separate app ID, urging users to move to that one instead. The developer's decision to update the app comes after an attacker was able to gain access to his digital keys, allowing them to inject malicious code into the SmartTube app.

    The vulnerability in SmartTube has raised concerns among Android TV device users, as it exposes their devices to potential security risks. A user who reverse-engineered the compromised SmartTube version number 30.51 found that it includes a hidden native library named libalphasdk.so [VirusTotal]. This library does not exist in the public source code, so it is being injected into release builds.

    "Possibly a malware. This file is not part of my project or any SDK I use. Its presence in the APK is unexpected and suspicious. I recommend caution until its origin is verified," cautioned Yuliskov on a GitHub thread. The library runs silently in the background without user interaction, fingerprints the host device, registers it with a remote backend, and periodically sends metrics and retrieves configuration via an encrypted communications channel.

    All this happens without any visible indication to the user, which raises concerns about the potential risks associated with using the compromised SmartTube app. While there's no evidence of malicious activity such as account theft or participation in DDoS botnets, the risk of enabling such activities at any time is high.

    In an effort to address the issue, Yuliskov has promised to release a new version of the app with improved security measures. The developer announced on Telegram that he would soon publish safe beta and stable test builds, but they have not reached the project's official GitHub repository yet.

    The developer has also stated that he will provide full details of what exactly happened in the future, which is expected to help build trust within the community. However, until then, users are recommended to stay on older, known-to-be-safe builds, avoid logging in with premium accounts, and turn off auto-updates.

    Impacted users are also advised to reset their Google Account passwords, check their account console for unauthorized access, and remove services they don't recognize. At this time, it is unclear exactly when the compromise occurred or which versions of SmartTube are safe to use. One user reported that Play Protect doesn't flag version 30.19, so it appears safe.

    The incident highlights the importance of maintaining strict security measures for third-party apps and the need for developers to prioritize their users' safety and security. It also emphasizes the importance of vigilance and caution when using apps from untrusted sources.

    BleepingComputer has contacted Yuliskov to determine which versions of the SmartTube app were compromised, but a comment hasn't been available yet.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Malicious-Update-A-Vulnerability-in-SmartTube-YouTube-App-Exposes-Android-TV-Devices-to-Security-Risks-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/smarttube-youtube-app-for-android-tv-breached-to-push-malicious-update/

  • https://www.androidauthority.com/smarttube-malware-fix-3620773/


  • Published: Mon Dec 1 13:21:09 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us