<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Dayvid Kelly (Dayvid)</title>
    <description>The latest articles on Forem by Dayvid Kelly (Dayvid) (@dayvid_kelly).</description>
    <link>https://forem.com/dayvid_kelly</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3378459%2Fb2c363bd-32e8-4726-825c-4a05f8f25386.jpg</url>
      <title>Forem: Dayvid Kelly (Dayvid)</title>
      <link>https://forem.com/dayvid_kelly</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/dayvid_kelly"/>
    <language>en</language>
    <item>
      <title>The Projector Botnet: How a Simple Home Device Was Exploited for Ads, Data, and Bandwidth</title>
      <dc:creator>Dayvid Kelly (Dayvid)</dc:creator>
      <pubDate>Tue, 09 Dec 2025 19:43:20 +0000</pubDate>
      <link>https://forem.com/dayvid_kelly/the-projector-botnet-how-a-simple-home-device-was-exploited-for-ads-data-and-bandwidth-1049</link>
      <guid>https://forem.com/dayvid_kelly/the-projector-botnet-how-a-simple-home-device-was-exploited-for-ads-data-and-bandwidth-1049</guid>
      <description>&lt;p&gt;Smart home devices promise convenience, entertainment, and a more connected lifestyle. But my recent experience with an Android-based projector exposed a less visible side of this technology—one that quietly consumes bandwidth, generates hidden advertising revenue, and potentially opens the door to unknown third parties inside your home network.&lt;/p&gt;

&lt;p&gt;What began as a routine network check turned into a full digital autopsy, revealing a pattern of behavior that most consumers never see—and that many manufacturers never disclose.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fho5nwbp3lzbp84qg3mwh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fho5nwbp3lzbp84qg3mwh.png" alt="projector's home screen" width="800" height="456"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;How the Investigation Started&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;I run AdGuard Home on my local network to monitor and filter DNS requests from all connected devices. One evening, I opened the query log to troubleshoot slow network activity. Instead of normal traffic patterns, I discovered something unusual.&lt;/p&gt;

&lt;p&gt;My projector—identified as &lt;strong&gt;192.168.100.3 (Projector Android)&lt;/strong&gt;—was making &lt;strong&gt;hundreds&lt;/strong&gt; of DNS requests every hour.&lt;/p&gt;

&lt;p&gt;But not to the services you’d expect from a streaming device. These requests were going to:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;pornographic websites&lt;/li&gt;
&lt;li&gt;adult ad networks&lt;/li&gt;
&lt;li&gt;shady tracking domains&lt;/li&gt;
&lt;li&gt;click-fraud infrastructure&lt;/li&gt;
&lt;li&gt;foreign servers with no connection to any installed apps&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0ibb65em35vb8to6mwed.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0ibb65em35vb8to6mwed.png" alt="Found porn query" width="800" height="215"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Every single request originated from the projector, even when it was idle.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffwfppefmjbmwk15z2y0x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffwfppefmjbmwk15z2y0x.png" alt="Unrequested queries" width="800" height="447"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;A Pattern of Automated Porn and Ad Traffic&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;The logs showed constant attempts to access domains such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;jizzbunker.com&lt;/li&gt;
&lt;li&gt;porntire.com&lt;/li&gt;
&lt;li&gt;yescams.com&lt;/li&gt;
&lt;li&gt;discretxxx.com&lt;/li&gt;
&lt;li&gt;hotmoza.tv&lt;/li&gt;
&lt;li&gt;bbs.airav.cc&lt;/li&gt;
&lt;li&gt;various .xxx, .cc, .tv adult networks&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This traffic was:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;automated&lt;/li&gt;
&lt;li&gt;repetitive&lt;/li&gt;
&lt;li&gt;occurring at all hours&lt;/li&gt;
&lt;li&gt;unrelated to any user activity&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;AdGuard’s parental control filter blocked these domains, but the behavior itself was alarming.&lt;/p&gt;

&lt;p&gt;This wasn’t accidental browsing. It wasn’t caused by a user misclick.&lt;br&gt;
This was &lt;strong&gt;a background process built into the projector’s software&lt;/strong&gt;, calling home to ad networks and content providers without consent or awareness.&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;What This Means: Adware at the Firmware Level&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Cheap Android projectors often run heavily modified versions of Android. Many of these ROM builds include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;preinstalled “free movie” or “TV” apps&lt;/li&gt;
&lt;li&gt;hidden ad SDKs&lt;/li&gt;
&lt;li&gt;forced web traffic to generate advertising impressions&lt;/li&gt;
&lt;li&gt;data-harvesting services&lt;/li&gt;
&lt;li&gt;remote command-and-control channels&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In my case, the projector appeared to be doing the following:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Generating ad calls to porn sites&lt;/strong&gt; to create revenue for unknown third parties.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Contacting ad and tracking networks&lt;/strong&gt; likely embedded into preinstalled apps.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Initiating background traffic even when unused&lt;/strong&gt;, consuming bandwidth.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Possibly exposing the local network&lt;/strong&gt; to outside access through questionable services.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;When a device sends automated porn traffic in the background, it is not a “bug.”&lt;br&gt;
It is &lt;strong&gt;monetization through hidden adware&lt;/strong&gt;, installed at the factory level.&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;Why This Is Dangerous&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;These behaviors carry several risks:&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;1. Bandwidth theft&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;The device silently consumes your internet connection to run unsolicited activities.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;2. Exposure to unsafe networks&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Malicious domains may download additional payloads or link to command servers.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;3. Privacy invasion&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Your network activity becomes intertwined with adult traffic you never generated.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;4. Vulnerability to remote access&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Some cheap Android devices include backdoors that allow external control.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;5. Potential legal implications&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;If unfiltered, this traffic looks like intentional access to illegal websites.&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;How to Verify If Your Smart Devices Are Affected&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;If you own an Android-based projector, TV box, or budget streaming device, you can test it yourself:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Install AdGuard Home, Pi-hole, or similar DNS filtering software.&lt;/li&gt;
&lt;li&gt;Let it run for a few hours with the device connected.&lt;/li&gt;
&lt;li&gt;Check the query log for unusual patterns:&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;porn sites&lt;/li&gt;
&lt;li&gt;ad networks&lt;/li&gt;
&lt;li&gt;foreign domains&lt;/li&gt;
&lt;li&gt;unknown tracking services

&lt;ol&gt;
&lt;li&gt;Reboot the device and watch if traffic resumes immediately.&lt;/li&gt;
&lt;li&gt;Factory reset the device and check if the behavior persists.&lt;/li&gt;
&lt;li&gt;Remove or disable suspicious preinstalled apps.&lt;/li&gt;
&lt;li&gt;If possible, isolate the device on a separate VLAN or guest network.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If the logs continue after a reset, the behavior is likely baked into the firmware.&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;What Manufacturers Don’t Tell You&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Ultra-cheap Android projectors and TV boxes often come from factories that subsidize hardware costs by preinstalling:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;adware&lt;/li&gt;
&lt;li&gt;click-fraud bots&lt;/li&gt;
&lt;li&gt;tracking frameworks&lt;/li&gt;
&lt;li&gt;third-party revenue-generating services&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is why some devices are significantly cheaper than branded alternatives.&lt;br&gt;
The real product isn't the projector—it’s &lt;strong&gt;your network, your data, and your bandwidth&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;What Consumers Should Do&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Until stricter regulations force transparency in IoT devices, consumers can protect themselves by:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Avoiding no-brand Android projectors and TV boxes&lt;/li&gt;
&lt;li&gt;Using DNS filtering (AdGuard Home, Pi-hole)&lt;/li&gt;
&lt;li&gt;Isolating IoT devices on separate networks&lt;/li&gt;
&lt;li&gt;Monitoring traffic regularly&lt;/li&gt;
&lt;li&gt;Favoring reputable manufacturers with audited firmware&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Your projector should never secretly browse adult sites on its own.&lt;br&gt;
It should never contact dozens of unknown servers per minute.&lt;br&gt;
And it should never consume your bandwidth without permission.&lt;/p&gt;




&lt;h2&gt;
  
  
  &lt;strong&gt;Conclusion&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;This investigation revealed a disturbing truth hiding in plain sight:&lt;br&gt;
&lt;strong&gt;A smart device inside my home was not just projecting movies—it was participating in an underground ecosystem of ad fraud, bandwidth abuse, and unsolicited adult traffic.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If this can happen in a projector, it can happen in any smart device.&lt;/p&gt;

&lt;p&gt;Consumers deserve transparency.&lt;br&gt;
They deserve security.&lt;br&gt;
And they deserve hardware that doesn’t turn their home network into a silent revenue stream for unknown entities.&lt;/p&gt;

&lt;p&gt;Until that changes, awareness is our strongest defense.&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>projector</category>
    </item>
  </channel>
</rss>
