Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • The Hacker News
  • BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse
  • The Hacker News

BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse

[email protected] The Hacker News March 18, 2025
0

Mar 18, 2025Ravie LakshmananCyber Attack / Malware

At least four different threat actors have been identified as involved in an updated version of a massive ad fraud and residential proxy scheme called BADBOX, painting a picture of an interconnected cybercrime ecosystem.

This includes SalesTracker Group, MoYu Group, Lemon Group, and LongTV, according to new findings from the HUMAN Satori Threat Intelligence and Research team, published in collaboration with Google, Trend Micro, Shadowserver, and other partners.

The “complex and expansive fraud operation” has been codenamed BADBOX 2.0. It has been described as the largest botnet of infected connected TV (CTV) devices ever uncovered.

“BADBOX 2.0, like its predecessor, begins with backdoors on low-cost consumer devices that enable threat actors to load fraud modules remotely,” the company said. “These devices communicate with command-and-control (C2) servers owned and operated by a series of distinct but cooperative threat actors.”

The threat actors are known to exploit several methods, ranging from hardware supply chain compromises to third-party marketplaces, to distribute what ostensibly appear to be benign applications that contain surreptitious “loader” functionality to infect these devices and applications with the backdoor.

Cybersecurity

The backdoor subsequently causes the infected devices to become part of a larger botnet that’s abused for programmatic ad fraud, click fraud, and offers illicit residential proxy services –

  • Hidden ads and launching hidden WebViews to generate fake ad revenue
  • Navigation to low-quality domains and clicking on ads for financial gain
  • Routing traffic through compromised devices
  • Using the network for account takeover (ATO), fake account creation, malware distribution, and DDoS attacks

As many as one million devices, mainly comprising inexpensive Android tablets, connected TV (CTV) boxes, digital projectors, and car infotainment systems, are estimated to have fallen prey to the BADBOX 2.0 scheme. All the affected devices are manufactured in mainland China and shipped globally. A majority of the infections have been reported in Brazil (37.6%), the United States (18.2%), Mexico (6.3%), and Argentina (5.3%).

The operation has since been partially disrupted a second time in three months after an undisclosed number of BADBOX 2.0 domains have been sinkhole in an attempt to cut off communications with the infected devices. Google, for its part, removed a set of 24 apps from the Play Store that distributed the malware. A portion of its infrastructure was previously taken down by the German government in December 2024.

“The infected devices are Android Open Source Project devices, not Android TV OS devices or Play Protect certified Android devices,” Google said. “If a device isn’t Play Protect certified, Google doesn’t have a record of security and compatibility test results. Play Protect certified Android devices undergo extensive testing to ensure quality and user safety.”

The backdoor that forms the core of the operation is based on an Android malware known as Triada. Codenamed BB2DOOR, it is propagated in three different ways: A pre-installed component on the device, fetched from a remote server when booted for the first time, and downloaded via more than 200 trojanized versions of popular apps from third-party stores.

It’s said to be the handiwork of a threat cluster named MoYu Group, which advertises residential proxy services built upon BADBOX 2.0-infected devices. Three other threat groups are responsible for overseeing other aspects of the scheme –

  • SalesTracker Group, which is connected to the original BADBOX operation as well as a module that monitors infected devices
  • Lemon Group, which is connected to residential proxy services based on BADBOX and an ad fraud campaign across a network of HTML5 (H5) game websites using BADBOX 2.0
  • LongTV, a Malaysian internet and media company whose two dozen apps are behind an ad fraud campaign based on an approach known as “evil twin“

“These groups were connected to one another through shared infrastructure (common C2 servers) and historical and current business ties,” HUMAN said.

The latest iteration represents a significant evolution and adaptation, with the attacks also relying on infected apps from third-party app stores and a more sophisticated version of the malware that entails modifying legitimate Android libraries to set up persistence.

Cybersecurity

Interestingly, there is some evidence to suggest overlaps between BB2DOOR and Vo1d, another malware that’s known to specifically target off-brand Android-based TV boxes.

“The BADBOX 2.0 threat in particular is compelling in no small part because of the open-season nature of the operation,” the company added. “With the backdoor in place, infected devices could be instructed to carry out any cyber attack a threat actor developed.”

The development comes as Google removed over 180 Android apps spanning 56 million downloads for their involvement in a sophisticated ad fraud scheme dubbed Vapor that leverages fake Android apps to deploy endless, intrusive full-screen interstitial video ads, per the IAS Threat Lab.

It also follows the discovery of a new campaign that employs DeepSeek-themed decoy sites to trick unsuspecting users into downloading an Android banking malware referred to as Octo.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

About The Author

[email protected] The Hacker News

See author's posts

Original post here

Continue Reading

Previous: ChatGPT Vulnerability Exploited Against US Government Organizations
Next: China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation

Trending Now

Oops: DanaBot Malware Devs Infected Their Own PCs Oops: DanaBot Malware Devs Infected Their Own PCs 1

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs danabot.png 2

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks chinese-hackers-attacking.jpg 3

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

May 22, 2025
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise exploitss.jpg 4

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks chinese.jpg 5

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

May 22, 2025
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program cyber-program.jpg 6

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025

Related Stories

chinese-hackers-attacking.jpg
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

[email protected] The Hacker News May 22, 2025 0
exploitss.jpg
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

[email protected] The Hacker News May 22, 2025 0
chinese.jpg
  • The Hacker News

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

[email protected] The Hacker News May 22, 2025 0
cyber-program.jpg
  • The Hacker News

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

[email protected] The Hacker News May 22, 2025 0
exploit.jpg
  • The Hacker News

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

[email protected] The Hacker News May 22, 2025 0
main.jpg
  • The Hacker News

Identity Security Has an Automation Problem—And It’s Bigger Than You Think

[email protected] The Hacker News May 22, 2025 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Oops: DanaBot Malware Devs Infected Their Own PCs Oops: DanaBot Malware Devs Infected Their Own PCs 1
  • Uncategorized

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs danabot.png 2
  • Krebs On Security

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks chinese-hackers-attacking.jpg 3
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

May 22, 2025
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise exploitss.jpg 4
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks chinese.jpg 5
  • The Hacker News

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

May 22, 2025
Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program cyber-program.jpg 6
  • The Hacker News

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025
Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host exploit.jpg 7
  • The Hacker News

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

May 22, 2025

You may have missed

Oops: DanaBot Malware Devs Infected Their Own PCs
  • Uncategorized

Oops: DanaBot Malware Devs Infected Their Own PCs

Sean May 22, 2025 0
danabot.png
  • Krebs On Security

Oops: DanaBot Malware Devs Infected Their Own PCs

BrianKrebs May 22, 2025 0
chinese-hackers-attacking.jpg
  • The Hacker News

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

[email protected] The Hacker News May 22, 2025 0
exploitss.jpg
  • The Hacker News

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

[email protected] The Hacker News May 22, 2025 0
Copyright © 2025 All rights reserved. | MoreNews by AF themes.