FBI Report: BADBOX 2.0 Android Malware Compromises Millions of Consumer Devices

مقالات

Android malware

The FBI has issued a warning regarding the BADBOX 2.0 malware, which has successfully infected over one million Internet-connected consumer devices. This malware campaign is transforming everyday electronics into residential proxies, facilitating various malicious activities.

The BADBOX botnet primarily targets a range of Chinese Android-based smart devices, including smart TVs, streaming boxes, projectors, tablets, and other Internet of Things (IoT) devices.

The FBI alerts that “the BADBOX 2.0 botnet comprises millions of compromised devices and features multiple backdoors to proxy services. Cybercriminals exploit these vulnerabilities, either by selling access or providing free services to hijacked home networks for nefarious purposes.”

Devices may come pre-installed with the BADBOX 2.0 malware or become infected through firmware updates and malicious applications that infiltrate Google Play and other app stores.

According to the FBI, unauthorized access to home networks may occur through two methods: pre-configuring the product with malicious software before purchase or infecting the device during the downloading of necessary applications containing backdoors, typically during initial setup.

Once integrated within home networks, these compromised IoT devices can be incorporated into the BADBOX 2.0 botnet and serve as residential proxy services exploited for unlawful activities.

Infected devices establish connections with the attackers’ command and control (C2) servers, where they receive directives to perform operations, including:

  • Residential Proxy Networks: Traffic from cybercriminals is routed through victims’ home IP addresses, concealing their malicious activities.
  • Ad Fraud: BADBOX is capable of generating ad revenue for threat actors by loading and clicking on ads in the background.
  • Credential Stuffing: Utilizing victim IP addresses, attackers may attempt to gain unauthorized access to accounts using stolen credentials.

BADBOX 2.0 emerged as an evolution of the original BADBOX malware, identified in 2023 when it was found pre-installed on low-cost, lesser-known Android TV boxes such as the T95.

Throughout the following years, the malware’s botnet expanded. In 2024, Germany’s cybersecurity agency successfully disrupted the botnet by sinkholing communications between infected devices and the attackers’ infrastructure, thereby neutralizing the malware’s effectiveness.

Despite this disruption, the threat persisted, as researchers discovered the malware on 192,000 devices just a week later, including on more mainstream devices such as Yandex TVs and Hisense smartphones.

Alarming reports indicate that the botnet continued to proliferate, with HUMAN’s Satori Threat Intelligence estimating that over one million consumer devices had been compromised by March 2025.

This newly expanded botnet is now referred to as BADBOX 2.0, signifying an ongoing evolution in the malware campaign.

According to experts from HUMAN, “This scheme has affected over one million consumer devices. The types of devices connecting to the BADBOX 2.0 operation encompass budget ‘off brand’ products, uncertified tablets, connected TV boxes, digital projectors, among others.”

Additionally, “the infected devices are those using the Android Open Source Project, not those running the Android TV OS or certified as Play Protect compliant. All affected devices are manufactured in mainland China and distributed worldwide, with BADBOX 2.0-associated traffic observed from 222 countries and territories globally.”

Research indicates that the BADBOX 2.0 botnet spans 222 countries, with the largest concentrations of compromised devices in Brazil (37.6%), the United States (18.2%), Mexico (6.3%), and Argentina (5.3%).

BadBox 2.0 Global Distribution
BADBOX 2.0 Global Distribution
Source: HUMAN Satori

In a collaborative endeavor led by HUMAN’s Satori team and partners including Google, Trend Micro, and The Shadowserver Foundation, additional disruptions to the BADBOX 2.0 botnet were carried out, severing communication for over 500,000 infected devices with the attackers’ servers.

Nonetheless, the botnet’s size continues to increase as consumers inadvertently connect more compromised devices to the Internet.

Identified devices affected by the BADBOX malware include:

Device Model Device Model Device Model Device Model
TV98 X96QMaxP Q96L2 X96Q2
X96mini S168 ums5121h10Natv X96_S400
X96mini_RP TX3mini HY-001 MX10PRO
X96mini_Plus1 LongTV_GN7501E Xtv77 NETBOX_B68
X96Q_PR01 AV-M9 ADT-3 OCBN
X96MATE_PLUS KM1 X96Q_PRO Projector_T6P
X96QPRO-TM sp7731e1h10native M8SPROW TV008
X96Mini_5G Q96MAX Orbsmart_TR43 Z6
TVBOX Smart KM9PRO A15
Transpeed KM7 iSinbox I96
SMART_TV Fujicom-SmartTV MXQ9PRO MBOX
X96Q isinbox Mbox R11
GameBox KM6 X96Max_Plus2 TV007
Q9 Stick SP7731E H6 X88
X98K TXCZ  

Symptoms suggesting a BADBOX 2.0 infection include the presence of suspicious app marketplaces, disabled Google Play Protect settings, advertisements for streaming devices claiming to be unlocked or offering free content access, and detections of unusual Internet traffic.

The FBI recommends consumers take proactive measures to shield themselves from this botnet by adhering to the following protocols:

  • Evaluate all IoT devices linked to home networks for irregular behavior.
  • Avoid downloading applications from unofficial marketplaces promoting “free streaming” content.
  • Monitor Internet traffic to and from home networks vigilantly.
  • Ensure all household devices are updated with the latest software patches and updates.

If you suspect that your device has been compromised, it is critical to isolate it from the network and restrict its Internet access to disrupt the malware’s functionality.