Why your Android TV Box may be secretly part of a botnet
NEWNow you can listen to News articles!
Android TV streaming boxes that promise “everything for one price” are everywhere right now.
You’ll see them on big box retailers’ sites, in influencer videos, and even recommended by friends who swear they’ve cut the cord forever. And to be fair, they seem irresistible on paper, offering thousands of channels for a single payment. But security researchers warn that some of these boxes may have a hidden cost.
In several cases, devices sold as simple media streamers appear to quietly turn your home Internet connection into part of larger networks used for shady online activities. And many buyers have no idea what is happening.
Sign up to receive my FREE CyberGuy report
Get my best tech tips, urgent security alerts, and exclusive offers delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Guide to Surviving Scams, free when you join me CYBERGUY.COM information sheet.
WHY JANUARY IS THE BEST TIME TO DELETE PERSONAL DATA ONLINE

Android TV streaming boxes that promise unlimited channels for a one-time fee can silently turn home Internet connections into proxy networks, according to security researchers. (Photo by Paul Chinn/The San Francisco Chronicle via Getty Images)
What’s inside these transmission boxes?
According to research by Krebs on Security, media streaming devices do not behave like regular media streamers once they are connected to your network. Researchers are taking a closer look at SuperBox, which is an Android-based streaming box sold through third-party sellers on major retail platforms. On paper, SuperBox is marketed as hardware only. The company claims it does not pre-install pirated apps and insists that users are responsible for what they install. This sounds reassuring until you look at how the device actually works.
To unlock the thousands of channels that SuperBox advertises, you must first remove Google’s official app ecosystem and replace it with an unofficial app store. That step alone should draw attention. Once those custom apps are installed, the device not only streams video but also begins routing Internet traffic through third-party proxy networks.
What this means is that your home Internet connection can be used to transmit traffic to other people. That traffic can include ad fraud, credential stuffing attempts, and large-scale web scraping.
During testing by Censys, a cyber intelligence company that tracks Internet-connected devices, SuperBox models immediately contacted servers linked to Tencent’s QQ messaging service, run by Tencent, as well as a residential proxy service called Grass.
Grass describes itself as a volunteer network that allows you to earn rewards by sharing unused Internet bandwidth. This suggests that SuperBox devices may be using SDKs or tools that hijack bandwidth without clear user consent, effectively turning the box into a node within a proxy network.
Why SuperBox activity resembles botnet behavior
In simple terms, a botnet is a large group of compromised devices that work together to route traffic or perform online tasks without their owners realizing it.
Researchers discovered that the SuperBox devices contained advanced networking and remote access tools that have no business being in a streaming box. These include utilities such as Tcpdump and Netcat, which are commonly used for network monitoring and traffic interception.
The devices performed DNS hijacking and ARP poisoning on local networks, techniques used to redirect traffic and impersonate other devices on the same network. Some models even contained directories labeled “second stage,” suggesting additional payloads or functionality beyond streaming.
SuperBox is just one brand in a crowded market of no-name Android streaming devices. Many of them promise free content and quick setup, but they often come preloaded with malware or require unofficial app stores that expose users to serious risks.
In July 2025, Google filed a lawsuit against the operators behind what it called the BADBOX 2.0 botnet, a network of more than ten million compromised Android devices. These devices were used for ad fraud and proxy services, and many were infected before consumers even purchased them.
Around the same time, the feds warned that compromised streaming and IoT devices were It is used to gain unauthorized access to home networks. and funnel traffic to criminal proxy services.
We reached out to SuperBox for comment but did not receive a response by deadline.
8 steps you can take to protect yourself
If you already own one of these streaming boxes or are thinking about purchasing one, these steps can help you significantly reduce your risk.
1) Avoid devices that require unofficial app stores
If a streaming box asks you to remove Google Play or install apps from an unknown market, stop there. This bypasses Android’s built-in security controls and opens the door to malware. Legitimate Android TV devices do not require this.
2) Use powerful antivirus software on your devices
Even if the box itself is compromised, powerful antivirus software on your computers and phones can detect suspicious network behavior, malicious connections, or subsequent attacks such as credential stuffing. Powerful antivirus software monitors behavior, not just files, which is important when malware operates silently in the background. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best antivirus protection winners of 2026 for your Windows, Mac, Android, and iOS devices at Cyberguy.com.
3) Place streaming devices on a separate or guest network
If your router supports it, isolate smart TVs and streaming boxes from your main network. This prevents a compromised device from seeing your laptops, phones, or work systems. It’s one of the easiest ways to limit the damage if something goes wrong.
4) Use a password manager
If your Internet connection is abused, credential theft often follows. A password manager ensures that each account uses a unique password, so a breach doesn’t unlock everything. Many password managers also refuse to auto-populate suspicious or fake websites, which can alert you before you make a mistake.
MAKE 2026 YOUR MOST PRIVATE YEAR BY DELETING BROKER DATA

Researchers warn that some Android-based streaming boxes route user bandwidth through third-party servers linked to ad fraud and cybercrime. (Photo Illustration by Thomas Fuller/SOPA Images/LightRocket via Getty Images)
Next, check to see if your email has been exposed in previous breaches. Our #1 pick for password manager includes a built-in breach scanner that checks to see if your email address or passwords have appeared in known breaches. If you discover a match, immediately change any reused passwords and protect those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
5) Consider using a VPN for sensitive activities
A VPN won’t magically fix a compromised device, but it can reduce exposure by encrypting your traffic when you browse, bank, or work online. This makes it more difficult for third parties to inspect or misuse your data if your network is being relayed.
For the best VPN software, check out my expert review of the best VPNs for private web browsing on your Windows, Mac, Android and iOS devices in Cyberguy.com.
6) Monitor your Internet usage and router activity
Unexpected bandwidth spikes, slower speeds, or strange outgoing connections can be warning signs. Many routers display connected devices and traffic patterns.
If you notice suspicious traffic or behavior, unplug the streaming box immediately and perform a factory reset on your router. In some cases, the safest option is to stop using the device altogether.
Also, make sure your router’s firmware is up to date and that you have changed the default administrator password. Compromised devices often attempt to take advantage of weak router configuration to persist on a network.
7) Beware of “everything free” streaming promises
Unlimited premium channels for a one-time fee usually mean you’re paying in some other way, often with your data, bandwidth, or legal exposure. If a deal seems too good to be true, it usually is.
8) Consider a data removal service
If your internet connection or accounts have been abused, your personal data may already be circulating among data brokers. A data removal service can help you opt out of people search sites and reduce the amount of personal information that criminals can exploit for tracking scams or identity theft. While it won’t fix a compromised device, it can limit long-term exposure.
10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026

Cyber experts say certain low-cost streaming devices behave more like botnet nodes than legitimate media players once connected to home networks. (Photo by Alessandro Di Ciommo/NurPhoto via Getty Images)
Check out my top picks for data removal services and get a free scan to find out if your personal information is already available on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already available on the web: Cyberguy.com.
Kurt’s Key Takeaway
Streaming boxes like SuperBox thrive on frustration. As subscriptions pile up, people look for shortcuts. But when a device promises everything for nothing, it’s worth asking what it’s really doing behind the scenes. Research shows that some of these boxes don’t just broadcast television. They silently turn your home network into a resource for others, sometimes for criminal activity. Cutting the cord shouldn’t mean giving up control of your Internet connection. Before you include that “too good to be true” box, it’s worth stopping and looking a little closer.
Would you still use a transmission box What if that meant sharing the Internet with strangers? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE News APP
Sign up to receive my FREE CyberGuy report
Get my best tech tips, urgent security alerts, and exclusive offers delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Guide to Surviving Scams, free when you join me CYBERGUY.COM information sheet.
Copyright 2026 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning technology journalist with a deep love for technology, gear and devices that improve lives with his contributions to News and News Business since mornings on “News & Friends.” Do you have any technical questions? Get Kurt’s free CyberGuy newsletter, share your voice, a story idea or comment on CyberGuy.com.


