Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Unpacking the Grass Scandal: A Malicious Android TV Streaming Device Botnet



The FBI warns that certain Android TV streaming devices may be part of a botnet, and we delve into the details behind this threat to explore what's at stake and how it affects you.

  • Android TV streaming devices may be part of a botnet, distributing malware and participating in a decentralized network used for malicious purposes.
  • The Grass Android TV streaming device manufacturer is at the center of the controversy, with its network being hijacked by scammers for malicious use.
  • The company's compensation plan has raised concerns about the potential for a pyramid scheme, benefiting founders and early adopters rather than average users.
  • Users need to be aware of the potential risks associated with Android TV streaming devices and take steps to protect themselves from malicious activity.



  • In recent months, there has been growing concern about the potential for malicious activity emanating from certain Android TV streaming devices. The FBI has warned that these devices may be part of a botnet, a network of compromised computers or devices controlled by an attacker. But what exactly is a botnet, and how do these devices fit into it?

    To understand the issue, we need to examine the context in which these devices operate. Android TV streaming boxes are designed to provide users with access to various online services, including movies, TV shows, and music. However, some of these devices have been found to be part of a botnet, distributing malware that allows hackers to use them for their own nefarious purposes.

    At the center of this controversy is Grass, an Android TV streaming device manufacturer. According to reports, Grass devices are connected to a network called Grass IO, which allows users to earn rewards by sharing their unused internet bandwidth with AI labs and other companies. However, researchers have discovered that these devices are not only distributing malware but also participating in the creation of a decentralized network that can be used for malicious purposes.

    The Grass website claims that its network is designed to allow users to monetize their unused bandwidth by downloading the Grass app. The app allows users to earn rewards by contributing their own bandwidth and/or inviting other users to participate. However, researchers have discovered that the network has been hijacked by scammers who are using it for malicious purposes.

    "We looked at several Superbox models purchased from Best Buy, and they immediately contacted a server at Tencent QQ, as well as a residential proxy service called Grass IO," said Ashley, a researcher with Censys. "I'm sure a lot of people are thinking, 'Hey, how bad could it be if it's for sale at the big box stores?' But the more I looked, things got weirder and weirder."

    The researchers found that the Superbox devices were not only distributing malware but also participating in the creation of a decentralized network that can be used to conduct market research or perform tasks such as web scraping. The Grass website claims that its network is designed to allow users to see certain websites from a retail perspective by utilizing their unused internet bandwidth.

    However, researchers have discovered that the network has been hijacked by scammers who are using it for malicious purposes. "It looks like these boxes are distributing an unethical proxy network which people are using to try to take advantage of Grass," said Andrej Radonjic, the founder of Grass. "The point of grass is to be an opt-in network. You download the grass app to monetize your unused bandwidth."

    Radonjic claimed that Grass has implemented a robust system to identify network abusers and takes steps to stop them from earning points or rewards. However, researchers have found that the company's compensation plan is built around "grass points," which are earned through the use of the Grass app and through app usage by recruited affiliates.

    The 10th or "Titan" tier requires affiliates to accumulate a whopping 50 million grass points, or recruit at least 221 more affiliates. This has raised concerns about the potential for a pyramid scheme, with some researchers warning that the company's compensation plan may be designed to benefit the founders and early adopters rather than the average user.

    In conclusion, the Grass scandal highlights the need for users to be aware of the potential risks associated with Android TV streaming devices. While these devices can provide convenient access to online services, they also pose a significant threat to security if not used properly. As researchers continue to investigate this issue, it is essential that users remain vigilant and take steps to protect themselves from malicious activity.

    Additionally, Grass OpCo Ltd (no BVI in the name), the company behind Grass, has changed names at least five times in its two-year existence, with its parent company listed as Lower Tribeca Corp. in the Bahamas in March 2024, Half Space Labs Limited in August 2024, and Wynd Network in June 2023. The current parent company is Grass OpCo Ltd.

    It's worth noting that Super Media Technology Company Ltd., the parent company of Superbox, lists its street address as a UPS store in Fountain Valley, Calif. The company did not respond to multiple inquiries.

    As the story continues to unfold, it's essential that users remain informed and take steps to protect themselves from malicious activity emanating from these devices.

    Related Information:
  • https://www.ethicalhackingnews.com/articles/Unpacking-the-Grass-Scandal-A-Malicious-Android-TV-Streaming-Device-Botnet-ehn.shtml

  • https://krebsonsecurity.com/2025/11/is-your-android-tv-streaming-box-part-of-a-botnet/

  • https://www.tomsguide.com/computing/online-security/millions-of-android-tvs-hijacked-in-massive-botnet-how-to-see-if-yours-is-at-risk

  • https://www.pcmag.com/news/fbi-cheap-android-media-streaming-device-hosting-badbox-malware

  • https://cybersecuritynews.com/apt35-hacker-groups-internal-documents/

  • https://www.socinvestigation.com/comprehensive-list-of-apt-threat-groups-motives-and-attack-methods/


  • Published: Mon Nov 24 12:56:31 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us