SmartTube, the Popular YouTube Alternative, Distributes Malware Without Its Developer's Knowledge

Published on January 06, 2026 | Translated from Spanish
Screenshot of the SmartTube application interface on an Android TV, showing its video player and menu options, with a superimposed security warning symbol.

SmartTube, the popular YouTube alternative, distributes malware without its developer's knowledge

The Android TV user community has received alarming news. SmartTube, the widely used YouTube client app for offering an ad-free experience with premium features, has been involved in a serious security incident. An external attack compromised its distribution channel, leading thousands of devices to receive malicious software without its creator's knowledge. 🚨

The weak point was not the code, but the delivery

It is crucial to understand that the open-source code of the project, publicly available, contained no intentional flaws. The problem arose in a later link in the chain: the servers hosting the APK files for automatic updates were breached. An attacker managed to replace the legitimate SmartTube build with a manipulated version. This fraudulent version incorporated a Trojan known to security researchers as Xamalicious, capable of remotely controlling the device, exfiltrating confidential data, and acting as an entry point for further threats.

How did the attacker proceed?:
  • Infrastructure compromise: The malicious actor gained unauthorized access to the servers responsible for Over-The-Air (OTA) updates.
  • APK replacement: Replaced the authentic installer with one infected with Xamalicious code.
  • Automatic distribution: Users with automatic update enabled in the app silently received the malicious package.
"Even the most trusted sanctuary can be violated, not by a backdoor in the code, but by someone who simply changed the lock on the warehouse where the final copies were stored."

Developer's response and critical action guide

Yury, the main developer behind SmartTube, confirmed the incident and acted swiftly to contain it. His first measure was to disable automatic updates from the compromised servers, thus cutting off the malware's spread. He is currently working to restore a secure and verified supply chain. For users, the situation requires immediate actions to protect their devices.

Security recommendations for users:
  • Preventive uninstallation: It is advised to uninstall any version of SmartTube that was automatically updated in the last few weeks.
  • Official source only: Installation must be done exclusively by downloading the latest stable version from the project's official GitHub repository.
  • Manual update: It is essential to disable the automatic update option within the application and perform future updates manually, always downloading from GitHub.

A lesson on trust in the supply chain

This episode serves as a powerful cyber reminder for the entire software community, especially the open-source one. User trust is not only placed in the transparency of the code, but in the entire infrastructure surrounding it: servers, build processes, and distribution channels. A project can be audited and clean, but a single point of failure in its logistics can compromise thousands. Security is a chain, and its weakest link defines its strength. 🔗