Popular YouTube app for Android TV ‘SmartTube’ compromised with malware

The developer behind SmartTube, a widely embraced ad-free YouTube client for Android TV, has confirmed a significant security breach involving the app’s signing key. This incident has necessitated the swift release of a new version that operates under a different digital signature, raising concerns among its user base.

Details of the Compromise

The breach became apparent late last week when Yuriy Yuliskov, the sole maintainer of SmartTube, disclosed on GitHub and Patreon that his digital signing key had been compromised. This key, essential for authenticating and securing APK updates, was exploited by malicious actors to inject harmful code into app packages, effectively turning SmartTube updates against its own users. Yuliskov urged users to refrain from reinstalling the old app and instead await the newly signed version, which has since been released under a different app ID.

A user conducted a reverse-engineering analysis of the infected APKs, particularly version 30.51, revealing a native binary named libalphasdk.so. This component was covertly gathering sensitive information upon app launch, such as device UUIDs, local IP addresses, Android version, manufacturer, model, and network operator name. Additionally, it employed a custom networking stack, hardcoded Google endpoints (e.g., drive.google.com, dns.google), and scheduled periodic data transmissions to a remote server via encrypted DNS and HTTPS.

SmartTube has gained traction as a popular third-party YouTube client designed for Android TV platforms, including MiBox, Nvidia Shield, and Chromecast with Google TV. Its appeal lies in providing an ad-free and tracking-free YouTube experience, attracting millions of users who prefer alternatives to Google’s native applications. Many of these users rely on automatic updates through the app’s built-in updater, a mechanism now confirmed to have delivered infected APKs.

Infection Timeline and Response

A timeline of the infection indicates that versions between 28.56 and 30.52, distributed through third-party sites like APKPure, were particularly affected. VirusTotal scans flagged several of these packages, and infected APKs from GitHub were also confirmed, suggesting that Yuliskov’s development environment may have been fully compromised. In response, the developer acknowledged wiping his hard drive entirely to recover from the breach.

As a result of the compromised signature, Google Play Protect began disabling SmartTube installations across devices, triggering alerts such as “Your device is at risk” on Android TV platforms. Users found themselves unable to re-enable the app without first uninstalling it and then installing the new version. This behavior was intentional, as Yuliskov halted further updates to prevent users from receiving tainted builds.

In the midst of this turmoil, a new release, version 30.56, has been made available with a new signing key. This version installs as a separate application due to the change in package name. However, lingering transparency concerns persist. The developer has committed to providing a public disclosure detailing how the original key was leaked, the timing of the compromise, and the measures being implemented to avert similar incidents in the future.

Until that statement is released, community trust remains fragile. Some users have already urged the developer to provide hashes of clean builds, enhance code signing transparency, and offer verifiable evidence that his GitHub and Patreon accounts remain secure.

AppWizard
Popular YouTube app for Android TV ‘SmartTube’ compromised with malware