Android-Based Smart TVs Hit by Backdoor Spread via Malicious App

HONG KONG, CHINA--(Marketwired - Jan 8, 2016) - With the year-end shopping season over, many consumers now have new various smart gadgets in their homes. One particularly popular usage of this so-called Internet of Things (IoT) are smart TVs. These TVs are more than just passive display devices; many of them can even run Android apps as well. Some may find these features useful, but these capabilities bring their own risks.

Apps that allow users to watch channels from other parts of the world (that would otherwise be unavailable via other methods) are something that many users would find useful. However, some of these apps may put users at risk. These apps contain a backdoor that abuses an old flaw (CVE-2014-7911[1]) in Android versions before Lollipop 5.0 (Cupcake 1.5 to Kitkat 4.4W.2). (Trend Micro[2] detected these malicious apps as ANDROIDOS_ROOTSTV.A[3].)

Most smart TVs today use older versions of Android, which still contain this flaw. TV brands that sell vulnerable smart TVs include Changhong, Konka, Mi, Philips, Panasonic, and Sharp. In addition, other Android devices with older versions installed are also at risk: it just happens to be that because of these kinds of apps are mainly used in smart TVs or smart TV boxes.

The sites that distribute these malicious apps are located at the following URLs. These sites are under the H.TV name, with most visitors located in the United States or Canada.

Image   Sites that serve malware to smart TVs
Figure 1   http://pf3a[.]res4f[.]com/
Figure 2   https://sites[.]google[.]com/site/htvfanshare/2012summer_collection

In addition to the websites above, the malware also uses the following download servers:

Domain   Example   http://meiz[.]le2ui[.]com:80/marketdatas/apk/ChineseVideo2.11.1.apk   http://yaz[.]e3wsv[.]com:80/marketdatas/apk/ChineseVideo2.11.1.apk

How the Attack Happens

How is this attack distributed? First, the attackers lure owners of smart TVs to the websites mentioned above and get them to install the apps infected with malware. Once these are installed, the attacker will trigger the vulnerability in the system. Well-known exploit techniques like heap sprays or return-oriented programming[4] are used to gain elevated privileges in the system.

With elevated permissions, the attacker will then silently install others apps or malware onto the system. Our analysis revealed that they remotely update apps or remotely push related apps to the television sets.

However, note that these remotely installed apps are only downloaded via HTTP and not HTTPS. As a result, a second attacker capable of carrying out man-in-the-middle attacks could change the downloaded apps, in effect overriding the payload of the first attacker.

How to Protect Your Smart TVs

Trend Micro™ Mobile Security can detect this threat. While most mobile Android devices can easily be upgraded to the latest version, upgrading smart TV sets may be more challenging for users because they are limited by the hardware. As such, we recommend getting protection solutions installed instead and avoiding the installation of apps from third-party sites.

Check out this infographic to learn more about smart TV sets: Are Smart TVs Ready for Prime Time?[5]

Figure 1: Screenshot of sites that serve malware to smart TVs
Figure 2: Screenshot of site that serve malware to smart TVs[6][7]

Company Logo[8]

About Trend Micro
Trend Micro Incorporated, a global leader in security software, strives to make the world safe for exchanging digital information. Built on 26 years of experience, Trend Micro solutions for consumers, businesses, and governments provide layered data security to protect information on mobile devices, endpoints, gateways, and servers, as well as data stored in the cloud. Trend Micro provides smart protection with innovative security technology that fits an evolving ecosystem while remaining simple to deploy and manage. A cloud-based global threat intelligence[9] system, the Trend Micro™ Smart Protection Network™ infrastructure, powers all Trend Micro solutions, with additional support from more than 1,200 threat experts around the globe. For more information, visit[10].


  1. ^ CVE-2014-7911 (
  2. ^ Trend Micro (

Read more:

  1. Elemica Shares Eight and a Half Supply Chain Priorities for 2016
  2. Wi-Fi Alliance(R) Publishes 6 for 2016 Wi-Fi(R) Predictions
  3. prpl Foundation Reveals Vision for a Secure Internet of Things
  4. IoT Summit Announces 2016 Program March 17-18 2016
  5. People Power Debuts Ensemble IoT Software Suite at #CES2016
  6. WiSilica Demonstrates Bluetooth Low Energy Based IoT Platform at #CES2016

Get The Bar Code News once a month, once a week or once a day. Subscribe here.

Follow us on Twitter:

Follow us on Facebook: