Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

Cryptocurrency Mining Malware Strikes Fire TV Sticks

The malware has targeted thousands of vulnerable Android devices with a special developer feature activated, like Amazon Fire TV products sideloaded with sketchy apps.

By Michael Kan
June 12, 2018
Amazon Fire TV Stick With Alexa Voice Remote

Is your Amazon Fire TV Stick secretly mining cryptocurrency?

A hacker has reportedly unleashed Android malware that's been worming its way across thousands of vulnerable streaming devices—all in attempt to generate a virtual currency called Monero.

SecurityWatch The malware, called ADB.miner, has been spreading thanks to a powerful developer feature found on the Android operating system that's supposed to be turned off. The feature, Android Debug Bridge, can let a developer communicate and remotely execute commands over the device, without any authentication.

So far, Amazon hasn't commented on the threat.

Normally, the debug feature runs dormant. But on Monday, AFTVnews reported that the malware has been spreading to Fire TV Sticks with the developer feature turned on. Affected devices will display an app called "test" that'll persistently pop up as a white page and interrupt your media streaming as it starts to mine the virtual currency.

Users in an Android developers' forum began posting about the problems in April, and realized the app was actually ADB.miner. However, it doesn't appear that all Fire TV Sticks are vulnerable. The problem occurs when sideloading sketchy apps, which can activate the Android Debug Bridge feature. According to UK-based security researcher Kevin Beaumont, Amazon TV devices that've been modified to ship with Kodi, an open source media player, are among those affected.

Making matters worse is that products that've been infected will also attempt to spread the malicious code to other devices. ADB.miner isn't specifically targeting Fire TV Sticks, but any Android device with the debug feature enabled.

In February, Chinese security firm Qihoo 360's Netlab noticed the malware was scanning the internet for vulnerable products, including Android TV devices and smartphones. In just a few days, it managed to infect several thousand gadgets, mainly in China and South Korea.

As for why, Beaumont speculates that some vendors have been accidentally shipping products with the Android Debug Bridge turned on. "This is highly problematic as it allows anybody — without any password — to remotely access these devices as 'root' — the administrator mode — and then silently install software and execute malicious functions," he wrote in a blog post detailing the threat.

For now, only the ADB.miner malware appears to be exploiting the misconfigured Android devices. In this case, the malicious code only mines a cryptocurrency, which will merely hog the product's CPU processing power. Between 10,000 to over 100,000 devices may have been infected with ADB.miner, according to security researchers.

To remove the malware on a Fire TV Stick ($39.99 at Amazon) , initiate a factory reset, which can be accessed in the settings menu. That should clear the infection, but once the reset is finished, you'll need to make sure the Android Debug Bridge is turned off, to prevent possible re-infection. AFTVnews has a longer guide.

For owners of other affected Android devices, disabling the debug feature, and then deleting the "test" app should be able to clear the infection. Certain Android antivirus solutions can also detect and disinfect the malicious code.

How Your Password Was Stolen
PCMag Logo How Your Password Was Stolen

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About Michael Kan

Senior Reporter

I've been with PCMag since October 2017, covering a wide range of topics, including consumer electronics, cybersecurity, social media, networking, and gaming. Prior to working at PCMag, I was a foreign correspondent in Beijing for over five years, covering the tech scene in Asia.

Read Michael's full bio

Read the latest from Michael Kan