What files come to mind when you think of potentially dangerous filetypes? .exe files are definitely up there, as are app downloads from shady websites. Quite low on that list will be files such as .txt, which are usually highly trusted not to contain a virus.
This train of thought that something is “too simple” to carry viruses, however, can be great for hackers. They can use this false sense of security to sneak malware into a file that’s “too basic” to carry them. Recently, for example, there was a nasty spike of attacks as subtitles malware were being used to gain control of people’s computers.
Why Subtitle Files?
Getting a virus from a subtitle file seems very strange! After all, isn’t it just a file full of text?
While the subtitle file itself may not be able to do much damage, it can start a series of events that gives hackers access to someone’s computer. The main attack method for subtitle files is to act through a media player. Once installed, the subtitle file works through the media player when loaded to grant hackers access to the victim’s PC. Given how there are twenty-five different subtitle file types in use at the moment, media players have had to stretch themselves to fit every use case. This naturally leaves security holes that can be used.
Even worse, because subtitle files are highly trusted, the amount of security when parsing a subtitle file is very low. Not only are there flaws in the security, but should something take advantage of said flaws, there’s usually nothing there to stop it from taking control.
Due to the benign nature of subtitle files, antivirus software may totally fail to register the threat at all, making them a silent and effective means of gaining access to someone’s computer.
Who Does this Affect?

While there are a lot of lesser-known players out there that might be affected by this exploit, Checkpoint listed Popcorn, Kodi, VLC, and Stremio are popular video players that were vulnerable to this attack. As such, if you’ve used these players with downloaded subtitle files recently, you might want to perform a malware scan on your computer, especially if you haven’t updated the player in some time.
How Does the Attack Work?

In order for a hacker to get a subtitle file installed on a PC, they perform the following:
- First, they make or take a subtitle file that fits a popular movie, adding malicious code into it.
- They post the subtitles to a repository, which both people and software use to download and install subtitles.
- By abusing the rating system on said repositories, the hackers get their infected file boosted to the top of the list of subtitles as the most accurate subtitle file on the site.
- Users find the top-rated infected file and install it into their media players. This is done either manually by the user or by a user giving a command to a media player programmed to automatically locate and install the top-rated subtitle files on specific websites.
- Once run, the infected subtitle file grants hackers access to the victim’s PC.
If you’d like to see a somewhat scary demonstration of the hack in motion, watch the following video.








