Code To Cloud Summit 2026 — May 23, Calgary — Tickets are live!

A $500K Backup Failure, Jailbroken TV Boxes, and the Cybersecurity Lessons Every Business Leader Needs

Firewall Fridays Episode 52 — Dom Vogel and I break down how one company's untested backups turned into a half-million-dollar mistake, and why a $300 streaming box could be the biggest threat on your home network.

$500K Lost to untested backups
31 TB/s Botnet DDoS capacity
2M+ Compromised devices
4,000 GB Uploaded in one day

This week's Firewall Fridays hit different. In episode 52 of the Code to Cloud podcast, cybersecurity advisor Dom Vogel and I sat down for a conversation that should be required listening for every business owner, CFO, and IT leader in Western Canada — and honestly, anywhere.

We covered two stories. The first involves a construction company that lost nearly $500,000 because someone said the words "state of the art" and nobody asked a follow-up question. The second involves a $300 TV box from a big-box retailer that turned out to be a sophisticated Chinese espionage device — with a microphone in the remote, SCADA exploit code baked in, and a direct pipeline back to a botnet responsible for the largest DDoS attack ever recorded. The original research came out of the U.S. oil and gas sector, but the implications hit close to home for anyone in Western Canada's energy industry.

You can't make this stuff up.

What's Inside

  • How untested "state-of-the-art" backups cost one company $500K
  • The organizational failure pattern that made it possible
  • Why cloud-managed backups beat on-prem for 95% of Alberta businesses
  • Full technical breakdown of the SuperBox espionage device
  • How U.S. oil and gas workers were targeted — and why it matters for Western Canada
  • The MLM distribution model and psychological manipulation behind it
  • Detection indicators for IT security teams
  • Complete investigation timeline and further reading

Listen to the Full Episode

Story One: The $500K Backup That Never Worked

Dom Vogel is one of the sharpest cybersecurity operators I know — years of incident response, security architecture, and advisory work across Western Canada. When he tells you a story, it's because he's lived it. This one started with a phone call.

Dom got a call from the CFO of a mid-sized construction company, in a panic. They were in the middle of a major project, needed to submit critical files to hit milestones, and couldn't access anything. The IT person had told everyone the backup architecture was "state of the art." Problem is — it had never been tested.

When Dom dug in, the reality was brutal. The IT person — who happened to be the brother-in-law of one of the executives — hadn't tested the backup system since before he last changed the architecture. The most recent recoverable data went back to October 2025. The critical files had been created months after that.

The company had three options — none of them good:

  1. Manually recreate every file from scratch
  2. Pay the ransom and hope the files come back intact
  3. Go to the client, admit the delay, and negotiate for more time

They chose option three — and it came with a $500,000 financial penalty from their client for delaying the project by roughly three months. Half a million dollars, because nobody asked: "Have you actually tested a full restore?"

Dom's Rule of Thumb

"If it's untested, it's not working. Backed-up data that's never been restored — does it really exist? I call it Schrödinger's Data."

This applies to everything: backups, firewalls, endpoint protection, disaster recovery plans. If you're seeing a dashboard but have never validated the control, you're running on hope — not security.

The Root Cause Wasn't Technical — It Was Organizational

What struck me about this story is that it wasn't a technology failure. There was no sophisticated ransomware gang, no zero-day exploit. It was a breakdown in trust, accountability, and governance.

The IT person reported to the CFO. The CFO didn't know what to ask. The board had never discussed cybersecurity. Nobody was holding anyone accountable, and blind trust filled the gap where due diligence should have been.

Dom put it perfectly: this wasn't a single neck to choke. It was systemic — multiple layers of failure, which also means multiple layers of opportunity for growth.

Credit to that CFO — he owned it. He didn't fire the IT person. He said, "I didn't realize I needed to be doing that level of due diligence." And that's exactly where a fractional technology leader adds value. Someone who can bridge the gap between the technical team and the boardroom, ask the hard questions, and translate risk into language executives can act on.

As Dom said: "You hold me accountable, I hold them accountable, and you understand from a business and risk perspective what's being done."

The Cloud Argument — Made Real

This story also reinforced something I've believed for a long time: for 95% of Alberta businesses, cloud-managed backups are going to be better than whatever you build on-premise by yourself.

I used to build data centers. I remember a Microsoft engineer walking in and saying, "I can do it better than you, Kev." It stung at the time. But when you actually look at what cloud providers invest — firmware versioning, storage replication across regions, access tiering (hot, warm, cold), immutable backups — there's no way a single IT person with a server rack can match it. (If you're evaluating the common mistakes companies make during cloud migration, this is the root of most of them.)

Even something as simple as putting your files in SharePoint with Microsoft 365 means someone else is handling replication, geo-redundancy, and recovery for you. It's not about your skills. It's about the economics of doing it well at scale.

If you're an Alberta business still running critical files on a single on-prem file server, grab our free guide — it covers exactly these kinds of technology decisions.

Running on-prem backups you've never fully tested? You're not alone — and it's fixable. Let's figure out where the gaps are before they cost you.

Book a Free Strategy Call

Story Two: The SuperBox — A Trojan Horse in Your Living Room

The second half of the episode went somewhere I didn't expect — and it's a story that reframes everything we think we know about where cyberattacks happen.

For decades, the security industry has focused on hardening corporate networks. Firewalls. VPNs. Zero trust architectures. And it worked — the front door got harder to break through. So the adversaries stopped trying. Instead, they walked around to the back of the house. Literally. The new attack surface isn't the corporate data center. It's the suburbs. The cul-de-sac. The living room where an energy executive watches the game with a $300 streaming box that's quietly exfiltrating his credentials to a server in Shenzhen.

A security researcher known as D3ada55 — degree in rhetoric and propaganda from UC Berkeley, former stints at Palo Alto Networks, Google, and Apple, now a Senior Sales Engineer at CENSUS — discovered something alarming at her father's house in the U.S. Her dad, an oil and gas executive working in the American energy sector, had purchased multiple "SuperBoxes" — one for each TV. Someone at his work had told him he "needed to get one really bad."

The Cable Guy 1996 movie poster — the modern SuperBox threat is the cable guy era reborn
Remember the cable guy who'd jailbreak your box for fifty bucks? The SuperBox is that — except now it's a state-backed espionage platform sold by your neighbour at a farmers market.

You've seen the signs. Strapped to traffic lights by the Home Depot. "Unlimited movies, $300 a year." It's the cable guy era reborn — except the guy selling you the box doesn't know he's working for a foreign intelligence operation, and the box doesn't just steal HBO. It steals everything.

D3ada55's younger sister, also studying cybersecurity, noticed the home network slowed to a crawl after the boxes arrived. That was the first clue. What she found when she started digging was a sophisticated, state-backed espionage platform masquerading as a bargain streaming device — and the attack was designed from the ground up to exploit the one place nobody secures: the home.

The Researcher Behind the Discovery

What makes this story remarkable is who uncovered it and how. D3ada55 isn't a full-time threat researcher — she does this work "for fun" alongside her sales engineering role. She's self-taught: learned packet captures using a Hak5 Packet Squirrel, taught herself to decompile Android APKs, and eventually got her GCIA certification specifically to investigate this deeper.

After presenting her findings at BSides conferences in 2023, the US Department of Defense took immediate interest. A federal investigation was opened. D3ada55 was brought in to share her network traffic logs, packet captures, and threat intelligence with authorities. For years, she was only allowed to give talks under strict rules: no cameras, no microphones, no recordings, no photos. The investigation kept her from going public until 2026.

She's also paid a personal price. After going public with her research, D3ada55 was phished and DDoSed at her own home. She now carries a Faraday bag everywhere she goes.

What the SuperBox Actually Does

Here's where it gets terrifying. When D3ada55 analyzed the device on an isolated test network, the SuperBox's behaviour was immediately hostile:

Network Reconnaissance & Attack Behaviour

Firmware & Operating System Analysis

Remote Access Infrastructure

The Remote Control Hardware

Even the remote is compromised. D3ada55 found it contains a built-in microphone (no legitimate reason for a streaming remote), a Bluetooth antenna with unusually long range (far beyond what IR or standard Bluetooth requires), self-signed certificates, and open network ports visible on internet scans. The antenna length suggests it may even be cellular-capable. It's custom hardware — it only works with SuperBox, not generic Android TV remotes.

The Perfect Trojan Horse

"It's like a perfect Trojan horse, in the traditional sense. Here's this big present… and somebody is going to hide inside."

A $300 streaming device with a botnet client, a microphone-equipped remote, and SCADA exploit capabilities sitting on the home network of an oil and gas executive. This isn't theoretical. It's happening now.

Confirmed Botnet Infrastructure

The SuperBox isn't a standalone threat. It's part of a much larger operation:

ISPs have reported massive bandwidth anomalies from SuperBox users. One customer uploaded 4,000 gigabytes in a single day. Others report hitting their allocated bandwidth cap early every billing cycle. ISPs investigating "faulty meter" complaints keep finding the same thing: a SuperBox on the network.

Why the Suburbs — Not the Server Room — Are the New Battleground

This isn't random, and it isn't just about one country's oil and gas sector. It's about a fundamental shift in how nation-state actors approach espionage. Dom and I kept circling the same realization: the suburbs have become the attack surface. The original research happened in the U.S. — but the playbook transfers directly to anywhere the energy industry operates.

Think about who lives in suburban neighbourhoods in Calgary, Edmonton, Fort McMurray, and across the WCSB. The same kinds of targets: oil and gas executives, pipeline operators, engineers with SCADA access, financial controllers who approve seven-figure invoices. Western Canada's energy sector mirrors the U.S. industry that was targeted, and these devices are sold openly online — geography is not a firewall. Every one of these high-value targets has a home network protected by nothing more than the default router their ISP handed them.

The genius of this campaign is that it bypasses corporate security entirely. Why spend months probing a company's firewall when you can put a $300 spy device on an executive's kitchen counter and let them bring the VPN tunnel to you?

The attack vector is elegant in its simplicity. Workers bring their corporate laptops home and connect to VPNs. One report showed a SuperBox at a remote employee's house was probing their corporate network through the VPN tunnel. The box aggressively scans the network, discovers work devices, and sniffs credentials. No network segmentation at home means full visibility into work activities.

Think about that. The adversary isn't hammering the corporate firewall. They're going after the home network of a senior executive — the cul-de-sac in Tuscany, the acreage near Okotoks, the townhouse in Windermere. The places where confidential phone calls happen on speakerphone, where VPN sessions stay active for hours, and where the only "firewall" is a residential router with the default admin password still set.

Dom nailed it: this is bottom-up intelligence gathering. Don't attack the castle — attack the village where the generals live. Target workers in "positions of trust" with "privileged credentials." Someone logging into work systems from their kitchen table means credentials are exposed to anything else on that network. And if that "anything else" is a device with a microphone, a botnet client, and SCADA exploit code? Game over.

The Home-to-Corporate Attack Vector

"If you're working from home… in some type of important position where you have privileged credentials… you have this thing sitting on your network and don't know what it's potentially doing."

The original targeting happened in the U.S. energy sector — but these devices are sold across North America. For Alberta businesses with remote workers — especially in oil and gas, critical infrastructure, or any sector where people access sensitive systems from home — this is now a board-level risk. The same industries, the same roles, the same attack vector. Your corporate perimeter doesn't end at the office door. It extends to every employee's living room, every suburban router, every device on every home network. The suburbs are the new perimeter.

The MLM-Style Distribution Model

What's brilliant — and sinister — about the SuperBox campaign is how it spreads. This isn't being sold in dark web forums. It's being sold by your neighbour.

Who's selling them? Real estate agents. Cable installers. Single moms trying to make extra cash. Retired cops. Church groups "helping people get affordable TV." Family members, gym buddies, coworkers. These aren't threat actors — they're unwitting distribution channels.

And the price itself is a tell. A comparable cheap Android streaming box costs $30–$100. A SuperBox costs $300. Where does the premium go? Into the attack infrastructure.

The Psychological Manipulation

D3ada55's background in rhetoric and propaganda (that's literally her Berkeley degree) gave her a unique lens on this campaign. She identified multiple psychological vectors:

They even seeded fake Reddit accounts — created four years ago, never posted anything, then suddenly posted a glowing SuperBox review and went silent again. The timing aligns with the 2019–2020 campaign launch. A 2026 article in The Verge was effectively a propaganda piece making resellers look sympathetic — a retired cop helping his church get affordable TV. One seller was quoted saying, "I don't care about sending money to China." No mention of security risks anywhere in the piece.

Shell Companies and Fake Regulatory Compliance

When D3ada55 investigated the manufacturer, the trail went nowhere fast:

Displaying fake FCC certification marks is illegal. But enforcement is essentially absent, and the shell company structure means there's no one to hold accountable.

Also Known As…

SuperBox isn't the only brand name. The same hardware and botnet infrastructure ships under multiple brands, including vSeeBox and MagaBox. If someone in your family has any of these devices, the advice is the same: unplug it immediately. Don't just move it to a guest network — remove it from your home entirely.

What IT Security Teams Should Look For

If you're on a security team — especially at an energy company, critical infrastructure operator, or any organization with remote workers — here are the detection indicators Dom and I discussed:

Network Detection Indicators

For Leadership and Executives

  1. Oil and gas is being specifically targeted. This is not random. These devices are being mailed to employees' homes.
  2. Someone on your team may have recommended these. D3ada55's father got his recommendation from a coworker.
  3. VPN doesn't protect you here. The box is inside the VPN tunnel, probing corporate resources from within the trusted network.
  4. SCADA implications are real. The box attempted SCADA exploits immediately on first boot. If your organization operates industrial control systems, this is a critical risk.

For Individuals and Families

  1. Ask your family. Check if anyone has a "SuperBox," "vSeeBox," or "MagaBox." Especially older relatives.
  2. If you see one, unplug it. Don't put it on a guest network. Remove it from the home entirely.
  3. Segment your network. IoT devices should never be on the same network as work laptops. Ever.
  4. Price isn't an indicator of safety. The $300 box is actually more dangerous than the $30 one — the premium funds the attack infrastructure.

Words That Should Set Off Alarm Bells

Dom made a point that deserves its own callout: if you're a technical person, stop saying "state of the art." And definitely stop saying "it should work."

To trained ears — whether it's your fractional CTO, your auditor, or your CISO — those words signal uncertainty, not confidence. Either you understand how a system works or you don't. There's no middle ground when you're responsible for protecting an organization's data and operations.

It's better to say "I don't know" and go find the answer than to project false confidence that collapses under scrutiny.

Key Takeaways for Business Leaders

  1. Test your backups. Regularly. A backup that hasn't been restored is a hope, not a plan. Run full tabletop exercises. Bring in a third party to validate.
  2. Don't confuse a dashboard with security. Deploying EDR or a firewall doesn't mean it's working. Continuous validation testing is where the industry is headed — and where AI can play a massive role.
  3. Boards need to talk about cyber. If your board minutes don't mention cybersecurity, you have a governance gap. Executives are accountable for due diligence, not just the IT team.
  4. Audit every device on your network — including at home. If your team works remotely, home network hygiene is now a corporate security concern. Know what's connected.
  5. The home is the new perimeter. Remote work means your attack surface extends to every employee's living room. Network segmentation, device audits, and employee awareness aren't optional anymore.
  6. Get an independent advisor. Whether it's a fractional CTO or a fractional CISO, having someone who can bridge the technical-to-boardroom gap is the difference between a $500K lesson and a proactive strategy.

Timeline: The SuperBox Investigation

Further Reading & Resources

Frequently Asked Questions

What is a SuperBox and why is it dangerous?

A SuperBox is a jailbroken Android streaming device sold for around $300 that promises unlimited free TV. Security research has revealed these devices contain pre-installed malware — TeamViewer for remote access, credential-sniffing tools, and SCADA exploit code. They beacon to command-and-control servers in China, perform aggressive network scans, and function as nodes in the BadBox 2.0 and Aisuru-Kimwolf botnets. The FBI issued a public service announcement about these devices in June 2025.

Why are SuperBoxes targeting oil and gas workers?

SuperBoxes have been mailed directly to oil and gas employees' homes — sometimes unsolicited. The devices attempt SCADA vulnerability exploits on first boot, targeting the industrial control systems used in energy infrastructure. When workers connect to corporate VPNs from home, the SuperBox probes the corporate network through the VPN tunnel. This is bottom-up intelligence gathering: target workers with privileged access at home, where security is weakest.

How do I know if a SuperBox is on my network?

Look for excessive ARP requests from a single device, connections to qq.com or Tencent IP addresses, Android Debug Bridge traffic on port 5555, TeamViewer connections from non-workstations, and unusual upstream bandwidth. A MAC address OUI lookup showing a suspicious Chinese ODM is a strong indicator. Also check for devices branded as vSeeBox or MagaBox — same hardware, same botnet.

How often should businesses test their backups?

Full restore tests at least quarterly. Tabletop disaster recovery exercises at least annually. Any architecture change triggers an immediate validation test. A backup that has never been restored is Schrödinger's Data — it might work, it might not, and you won't know until it's too late. One company learned this the hard way with a $500,000 penalty.

Is putting a SuperBox on a guest network enough?

No. The device contains a microphone-equipped remote, a long-range Bluetooth antenna, and potentially cellular capability. Guest network isolation doesn't address audio surveillance or out-of-band communication. Unplug it entirely and remove it from your home.

What's Next

Firewall Fridays continues — Dom and I are recording these monthly, and it's quickly becoming one of the most popular segments on the Code to Cloud podcast. If you're a business owner, tech leader, or IT professional in Alberta or Western Canada, join our Discord community where these conversations keep going between episodes.

And if this episode hit home — if you're not sure whether your backups actually work, or you're wondering what's lurking on your network — that's exactly the kind of thing we help businesses figure out. Book a free strategy call and let's talk.

Know someone in oil and gas who needs to hear this? Send them this article. The SuperBox story is the kind of thing that protects people when it gets shared — not when it stays in a browser tab.

Kevin Evans — Fractional CTO and founder of Code To Cloud

Kevin Evans

Fractional CTO & Founder, Code To Cloud

Kevin Evans is a fractional CTO and technology advisor based in Calgary, Alberta. He helps startups and growing businesses across Western Canada make smart technology decisions — from cloud architecture and cybersecurity to AI readiness — without hiring a full-time executive. More about Kevin

Not sure if your backups actually work?

Let's talk about your technology, your risks, and where the gaps are — before they cost you.

50+ advisory engagements across Alberta & Western Canada

Book a Free Strategy Call