After a bigger research for STB firmware we found out that the firmware over the air is absolute not secured and easy to unpack.
Grabbing the Kernel code and enter the STB filesystem is easier by using the internal lan or use USB for an exploit.
Sofiane Talma from IO/Active released a nice report about it. You can read the article here: http://hackaday.com/2015/08/09/millions-of-satellite-receivers-are-low-hanging-fruit-for-botnets/
Possible to infect the STB or Trojan it for leaking any information out of it.