132
submitted 1 month ago* (last edited 1 month ago) by AmbiguousProps@lemmy.today to c/opensource@lemmy.ml

cross-posted from: https://lemmy.today/post/42851505

Slightly more detail in this GitHub issue, however much is still unknown, even after three or so days. The dev hasn't revealed any further details. Some articles on this incident:

Note that the articles provide little detail on what's happened, mostly just detail that a malicious library was found and Play Protect started removing the app if affected. It's unclear which versions are specifically affected, how the dev got breached, and what the malware actually does. According to a user (who may or may not be using some sort of LLM, their comment sounds like one at least) in a separate, related issue, the malware may collect device info and send to a command & control server. It could (in theory) receive new instructions at any point if it's a C2 server. Again, it does appear that they had an LLM of some sort generate their comment, so take it with a grain of salt.

I'm going to uninstall the app and revoke access on my Google account page. I see little reason to need to reset my password as of right now, since the app uses an API key and not my actual password. In my opinion, it's possibly related to YT viewbotting and commenting, or to add your device to a botnet. It's unclear to me how this botnet would work in practice, since even Android TV sandboxes apps (for the most part).

Update: it appears that this may be related to the Vo1d botnet: DrWeb: Android.Vo1d.14.origin. If this is indeed the case, then the goal was to add devices to the botnet. It's my understanding that previous versions of this botnet typically required cheap, pre-rooted Android TV boxes, in order to install other apps. I'm not sure if that means that you're safe if your device is not rooted. It might be worth checking your installed apps for oddities.

you are viewing a single comment's thread
view the rest of the comments
[-] radswid@feddit.org 1 points 1 month ago

There seems to be an alternative for ad-free youtube called TizenTube Cobalt. Gonna try it today. https://github.com/reisxd/TizenTubeCobalt/releases

[-] ohshit604@sh.itjust.works 4 points 1 month ago* (last edited 1 month ago)

Invidious has existed for many years, I would also suggest Piped but I’m pretty sure their development cycle is a lot slower.

[-] AmbiguousProps@lemmy.today 3 points 1 month ago

Do either of those work on Android TV?

[-] 0_o7@lemmy.dbzer0.com 2 points 1 month ago

They are self-hosted web front ends for YouTube. So you'll need to host the backend and frontend somewhere. Then you'll just need a browser.

There are public instances but they are not reliable as they are shared with a lot of internet users, and YouTube blacklists them quickly.

[-] AmbiguousProps@lemmy.today 2 points 1 month ago

Yeah, I guess I knew what they were, but it seems like it would be rough to use on an Android TV in the browser compared to purpose built TV applications.

[-] ohshit604@sh.itjust.works 1 points 1 month ago* (last edited 1 month ago)

You will have time find applications that support the Invidious APi, I don’t personally use android/android-TV but on iOS/TvOSI use Yattee.

Given that I host my own instance and don’t typically use the public ones l can just visit my domain an get it with ease.

this post was submitted on 02 Dec 2025
132 points (99.3% liked)

Open Source

43154 readers
874 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 6 years ago
MODERATORS