Malicious TV boxes: how a cheap “SuperBox” turns your home into a proxy node for cybercriminals | Kaspersky official blog
A cheap Android TV box promising free subscriptions can easily become the backbone for cybercriminal botnets and proxy servers. We break down how these streaming boxes lease out your IP address, and how to choose a device that’s secure.
AI Analysis
Technical Summary
The threat involves Android TV boxes, notably the SuperBox, which come preloaded with malicious firmware that converts these devices into botnet nodes and proxy servers. Upon activation, these devices connect to external servers to lease out the owner's internet bandwidth and run malware components such as network scanners, traffic analyzers, and DNS hijackers. This malware enables the devices to scan local networks for vulnerable targets, participate in distributed denial-of-service (DDoS) attacks, and potentially facilitate multi-stage malware operations. The infection vector is embedded in the manufacturing or supply chain process, often without the manufacturer's awareness. The compromised devices expose users to risks including IP blacklisting, interception of network traffic, and potential legal consequences. The threat is part of a broader trend of Android-based devices being exploited for botnets, with significant global distribution.
Potential Impact
Infected Android TV boxes act as proxy nodes for cybercriminals, leasing out the owner's internet bandwidth and participating in malicious activities such as network scanning and DDoS attacks. This compromises the security and privacy of the home network, exposing connected devices to interception, spoofing, and exploitation. Users risk having their IP addresses blacklisted, which can disrupt legitimate internet usage and potentially lead to law enforcement scrutiny. The malware's presence in firmware means the infection is persistent and difficult to remove without replacing or re-flashing the device. The threat affects millions of devices worldwide, with infected units sold openly on major retail platforms.
Mitigation Recommendations
No official patch or firmware update is available as the malware is embedded in the device firmware at manufacturing or supply chain stages. Users should avoid purchasing uncertified or no-name brand Android TV boxes, especially those lacking Google Play Protect certification or requiring disabling of security features. It is recommended to buy certified devices from reputable vendors or telecom providers. Isolate TV boxes and similar smart devices on a separate Wi-Fi network to prevent lateral movement to critical devices. Regularly update firmware on all devices and routers. Remove any suspicious or preinstalled applications not installed by the user. Monitor network traffic for unusual connections, particularly to foreign servers. Maintain Google Play Protect enabled and avoid installing APKs from untrusted sources. If a device is suspected to be infected, returning or replacing it is advised.
Malicious TV boxes: how a cheap “SuperBox” turns your home into a proxy node for cybercriminals | Kaspersky official blog
Description
A cheap Android TV box promising free subscriptions can easily become the backbone for cybercriminal botnets and proxy servers. We break down how these streaming boxes lease out your IP address, and how to choose a device that’s secure.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The threat involves Android TV boxes, notably the SuperBox, which come preloaded with malicious firmware that converts these devices into botnet nodes and proxy servers. Upon activation, these devices connect to external servers to lease out the owner's internet bandwidth and run malware components such as network scanners, traffic analyzers, and DNS hijackers. This malware enables the devices to scan local networks for vulnerable targets, participate in distributed denial-of-service (DDoS) attacks, and potentially facilitate multi-stage malware operations. The infection vector is embedded in the manufacturing or supply chain process, often without the manufacturer's awareness. The compromised devices expose users to risks including IP blacklisting, interception of network traffic, and potential legal consequences. The threat is part of a broader trend of Android-based devices being exploited for botnets, with significant global distribution.
Potential Impact
Infected Android TV boxes act as proxy nodes for cybercriminals, leasing out the owner's internet bandwidth and participating in malicious activities such as network scanning and DDoS attacks. This compromises the security and privacy of the home network, exposing connected devices to interception, spoofing, and exploitation. Users risk having their IP addresses blacklisted, which can disrupt legitimate internet usage and potentially lead to law enforcement scrutiny. The malware's presence in firmware means the infection is persistent and difficult to remove without replacing or re-flashing the device. The threat affects millions of devices worldwide, with infected units sold openly on major retail platforms.
Mitigation Recommendations
No official patch or firmware update is available as the malware is embedded in the device firmware at manufacturing or supply chain stages. Users should avoid purchasing uncertified or no-name brand Android TV boxes, especially those lacking Google Play Protect certification or requiring disabling of security features. It is recommended to buy certified devices from reputable vendors or telecom providers. Isolate TV boxes and similar smart devices on a separate Wi-Fi network to prevent lateral movement to critical devices. Regularly update firmware on all devices and routers. Remove any suspicious or preinstalled applications not installed by the user. Monitor network traffic for unusual connections, particularly to foreign servers. Maintain Google Play Protect enabled and avoid installing APKs from untrusted sources. If a device is suspected to be infected, returning or replacing it is advised.
Technical Details
- Article Source
- {"url":"https://www.kaspersky.com/blog/android-tv-botnet/55799/","fetched":true,"fetchedAt":"2026-05-20T15:49:44.217Z","wordCount":1756}
Threat ID: 6a0dd818ba1db473628c3aa5
Added to database: 5/20/2026, 3:49:44 PM
Last enriched: 5/20/2026, 3:49:55 PM
Last updated: 5/20/2026, 8:27:11 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.