Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse

The Hacker News by The Hacker News
March 18, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Mar 18, 2025Ravie LakshmananCyber Attack / Malware

At least four different threat actors have been identified as involved in an updated version of a massive ad fraud and residential proxy scheme called BADBOX, painting a picture of an interconnected cybercrime ecosystem.

This includes SalesTracker Group, MoYu Group, Lemon Group, and LongTV, according to new findings from the HUMAN Satori Threat Intelligence and Research team, published in collaboration with Google, Trend Micro, Shadowserver, and other partners.

The “complex and expansive fraud operation” has been codenamed BADBOX 2.0. It has been described as the largest botnet of infected connected TV (CTV) devices ever uncovered.

“BADBOX 2.0, like its predecessor, begins with backdoors on low-cost consumer devices that enable threat actors to load fraud modules remotely,” the company said. “These devices communicate with command-and-control (C2) servers owned and operated by a series of distinct but cooperative threat actors.”

The threat actors are known to exploit several methods, ranging from hardware supply chain compromises to third-party marketplaces, to distribute what ostensibly appear to be benign applications that contain surreptitious “loader” functionality to infect these devices and applications with the backdoor.

Cybersecurity

The backdoor subsequently causes the infected devices to become part of a larger botnet that’s abused for programmatic ad fraud, click fraud, and offers illicit residential proxy services –

  • Hidden ads and launching hidden WebViews to generate fake ad revenue
  • Navigation to low-quality domains and clicking on ads for financial gain
  • Routing traffic through compromised devices
  • Using the network for account takeover (ATO), fake account creation, malware distribution, and DDoS attacks

As many as one million devices, mainly comprising inexpensive Android tablets, connected TV (CTV) boxes, digital projectors, and car infotainment systems, are estimated to have fallen prey to the BADBOX 2.0 scheme. All the affected devices are manufactured in mainland China and shipped globally. A majority of the infections have been reported in Brazil (37.6%), the United States (18.2%), Mexico (6.3%), and Argentina (5.3%).

The operation has since been partially disrupted a second time in three months after an undisclosed number of BADBOX 2.0 domains have been sinkhole in an attempt to cut off communications with the infected devices. Google, for its part, removed a set of 24 apps from the Play Store that distributed the malware. A portion of its infrastructure was previously taken down by the German government in December 2024.

“The infected devices are Android Open Source Project devices, not Android TV OS devices or Play Protect certified Android devices,” Google said. “If a device isn’t Play Protect certified, Google doesn’t have a record of security and compatibility test results. Play Protect certified Android devices undergo extensive testing to ensure quality and user safety.”

The backdoor that forms the core of the operation is based on an Android malware known as Triada. Codenamed BB2DOOR, it is propagated in three different ways: A pre-installed component on the device, fetched from a remote server when booted for the first time, and downloaded via more than 200 trojanized versions of popular apps from third-party stores.

It’s said to be the handiwork of a threat cluster named MoYu Group, which advertises residential proxy services built upon BADBOX 2.0-infected devices. Three other threat groups are responsible for overseeing other aspects of the scheme –

  • SalesTracker Group, which is connected to the original BADBOX operation as well as a module that monitors infected devices
  • Lemon Group, which is connected to residential proxy services based on BADBOX and an ad fraud campaign across a network of HTML5 (H5) game websites using BADBOX 2.0
  • LongTV, a Malaysian internet and media company whose two dozen apps are behind an ad fraud campaign based on an approach known as “evil twin“

“These groups were connected to one another through shared infrastructure (common C2 servers) and historical and current business ties,” HUMAN said.

The latest iteration represents a significant evolution and adaptation, with the attacks also relying on infected apps from third-party app stores and a more sophisticated version of the malware that entails modifying legitimate Android libraries to set up persistence.

Cybersecurity

Interestingly, there is some evidence to suggest overlaps between BB2DOOR and Vo1d, another malware that’s known to specifically target off-brand Android-based TV boxes.

“The BADBOX 2.0 threat in particular is compelling in no small part because of the open-season nature of the operation,” the company added. “With the backdoor in place, infected devices could be instructed to carry out any cyber attack a threat actor developed.”

The development comes as Google removed over 180 Android apps spanning 56 million downloads for their involvement in a sophisticated ad fraud scheme dubbed Vapor that leverages fake Android apps to deploy endless, intrusive full-screen interstitial video ads, per the IAS Threat Lab.

It also follows the discovery of a new campaign that employs DeepSeek-themed decoy sites to trick unsuspecting users into downloading an Android banking malware referred to as Octo.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
À l’occasion d’EuroCIS 2025, UROVO dévoile quatre produits révolutionnaires qui façonnent l’avenir du commerce de détail et des opérations d’entreposage.

À l'occasion d'EuroCIS 2025, UROVO dévoile quatre produits révolutionnaires qui façonnent l'avenir du commerce de détail et des opérations d'entreposage.

Recommended.

Gold is hot — but a classic Warren Buffett rule suggests caution, advisor says

Gold is hot — but a classic Warren Buffett rule suggests caution, advisor says

February 25, 2025
CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack

CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack

October 16, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio