SmartTube, the Popular YouTube Alternative, Distributes Malware Without Its Developer's Knowledge

Published on January 06, 2026 | Translated from Spanish
Screenshot of the SmartTube application interface on an Android TV, showing its video player and menu options, with a superimposed security warning symbol.

SmartTube, the popular YouTube alternative, distributes malware without its developer's knowledge

The Android TV user community has received alarming news. SmartTube, the widely used YouTube client app for offering an ad-free experience with premium features, has been involved in a serious security incident. An external attack compromised its distribution channel, leading thousands of devices to receive malicious software without its creator's knowledge. 🚨

The weak point was not the code, but the delivery

It is crucial to understand that the open-source code of the project, publicly available, contained no intentional flaws. The problem arose in a later link in the chain: the servers hosting the APK files for automatic updates were breached. An attacker managed to replace the legitimate SmartTube build with a manipulated version. This fraudulent version incorporated a Trojan known to security researchers as Xamalicious, capable of remotely controlling the device, exfiltrating confidential data, and acting as an entry point for further threats.

How did the attacker proceed?:
"Even the most trusted sanctuary can be violated, not by a backdoor in the code, but by someone who simply changed the lock on the warehouse where the final copies were stored."

Developer's response and critical action guide

Yury, the main developer behind SmartTube, confirmed the incident and acted swiftly to contain it. His first measure was to disable automatic updates from the compromised servers, thus cutting off the malware's spread. He is currently working to restore a secure and verified supply chain. For users, the situation requires immediate actions to protect their devices.

Security recommendations for users:

A lesson on trust in the supply chain

This episode serves as a powerful cyber reminder for the entire software community, especially the open-source one. User trust is not only placed in the transparency of the code, but in the entire infrastructure surrounding it: servers, build processes, and distribution channels. A project can be audited and clean, but a single point of failure in its logistics can compromise thousands. Security is a chain, and its weakest link defines its strength. 🔗