You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Decompilation and source code analysis was performed on app version v3.0.1r, retrieved from the official source that is provided on FMHY (https://linktr.ee/flixvision), using jadx.
A few months ago, users reported on Reddit that the Flix Vision app was making unsolicited network requests (signs of internet sharing/botnet). Being a reverse engineer myself, I decided to look into the latest version of the app and check for potential malicious code.
I have discovered that the Flix Vision app has code that, at the developer's discretion, can remotely enable an internet-sharing SDK called TraffMonetizer that runs in the background. This turns the users of the Flix Vision app into exit nodes for residential proxy services that can perform web scraping and other malicious/illegal activities 1,2, using the user's internet connection, without their consent or knowledge. The developers of Flix Vision get revenue from TraffMonetizer for selling user's internet connections.
The following is the flow:
On app start and in the background, a configuration file is retrieved which has the base settings for Flix Vision. There is a primary and backup URL (t.ly/gcCVh, github.com/fvision8/publish/releases/download/12/conf.json).
As of 1/11/2025, the JSON file returns the following:
Take note of the traff_sd value.
Once retrieval is complete, parseRemoteConfig is called. At its core, it's nothing special, but there's this code that checks the traff_sd boolean and sets it accordingly in pref_traff_1. It also initializes a new package with a key if it's true, and stops if it is false. What is this "hy1" package?
Looking into the package, it is initializing the TraffMonetizer SDK.
After integrating our SDK your free users will be sharing a tiny portion of their Internet bandwidth with our network (you can adjust the maximum shared traffic in your dashboard) - and we will pay you for this traffic.
This isn't the first time an Android app has been (mis)used for this purpose, but in some cases the app asks for consent. Flix Vision clearly does not.
I would recommend removing Flix Vision from the FMHY directory https://fmhy.net/android-iosguide#android-streaming, or at the least flagging a warning for this code being present as there are a number of users that may have installed this app on their Android TV device, especially as it was spread pretty widely on YouTube and various sources.
The text was updated successfully, but these errors were encountered:
Type
Bad sites
Add additional context
Decompilation and source code analysis was performed on app version v3.0.1r, retrieved from the official source that is provided on FMHY (https://linktr.ee/flixvision), using jadx.
A few months ago, users reported on Reddit that the Flix Vision app was making unsolicited network requests (signs of internet sharing/botnet). Being a reverse engineer myself, I decided to look into the latest version of the app and check for potential malicious code.
I have discovered that the Flix Vision app has code that, at the developer's discretion, can remotely enable an internet-sharing SDK called TraffMonetizer that runs in the background. This turns the users of the Flix Vision app into exit nodes for residential proxy services that can perform web scraping and other malicious/illegal activities 1,2, using the user's internet connection, without their consent or knowledge. The developers of Flix Vision get revenue from TraffMonetizer for selling user's internet connections.
The following is the flow:
On app start and in the background, a configuration file is retrieved which has the base settings for Flix Vision. There is a primary and backup URL (t.ly/gcCVh, github.com/fvision8/publish/releases/download/12/conf.json).
As of 1/11/2025, the JSON file returns the following:
Take note of the traff_sd value.
Once retrieval is complete, parseRemoteConfig is called. At its core, it's nothing special, but there's this code that checks the traff_sd boolean and sets it accordingly in pref_traff_1. It also initializes a new package with a key if it's true, and stops if it is false. What is this "hy1" package?
Looking into the package, it is initializing the TraffMonetizer SDK.
Per TraffMonetizer:
This isn't the first time an Android app has been (mis)used for this purpose, but in some cases the app asks for consent. Flix Vision clearly does not.
I would recommend removing Flix Vision from the FMHY directory https://fmhy.net/android-iosguide#android-streaming, or at the least flagging a warning for this code being present as there are a number of users that may have installed this app on their Android TV device, especially as it was spread pretty widely on YouTube and various sources.
The text was updated successfully, but these errors were encountered: