BADBOX 2.0 Malware Hits 1M+ Android Devices Globally


0

The BADBOX 2.0 malware has emerged as one of the most significant cyber threats of 2025, infecting over one million Android devices worldwide. According to HUMAN’s Satori Threat Intelligence team, working alongside Google, Trend Micro, and Shadowserver, this evolved malware campaign targets low-cost Android Open Source Project (AOSP) devices with deeply embedded backdoors, fueling a sophisticated global cyber fraud operation.

What Is BADBOX 2.0 Malware?

BADBOX 2.0 is an advanced iteration of the original BADBOX malware first exposed in 2023. This version features a deeply embedded backdoor called BB2DOOR, designed to give attackers persistent, privileged access to infected devices. Unlike typical malware that requires user interaction, BADBOX 2.0 is often pre-installed on uncertified Android devices or downloaded unknowingly from third-party app stores and malicious command-and-control (C2) servers.

Scope and Impact of the BADBOX 2.0 Botnet

This malware has infected a wide range of off-brand Android CTV boxes, tablets, and projectors—mainly manufactured in mainland China. These uncertified devices are distributed globally and have been observed generating malicious traffic in 222 countries, with high infection rates in Brazil, the U.S., and Mexico.

This makes BADBOX 2.0 the largest botnet of connected TV (CTV) devices ever recorded, posing an unprecedented global cybersecurity challenge.

How BADBOX 2.0 Operates

The BB2DOOR backdoor exploits system-level libraries like libanl.so to grant attackers full remote access to a device. From there, attackers can:

  • Deploy hidden WebViews for ad fraud
  • Conduct click fraud on low-quality ad domains
  • Route residential traffic through infected devices for proxy services
  • Launch account takeover (ATO) attacks and DDoS attacks
  • Execute malicious APKs and scripts remotely

The malware uses encrypted string decryption and dynamic payload delivery via files such as p.jar and q.jar, which connect to C2 domains like catmore88[.]com.

Organized Threat Actor Collaboration

The threat operation behind BADBOX 2.0 isn’t the work of a lone group. Satori identified four primary threat actor groups:

  • SalesTracker
  • MoYu – sells proxy access at $13.64 per 5 GB via infected devices
  • Lemon Group
  • LongTV – uses “evil twin” apps to hide malicious ad activities

These groups share infrastructure and coordinate attacks, greatly increasing the malware’s reach and resilience.

Google and Industry Response

In response, Google has terminated associated ad accounts and blocked BADBOX-linked apps on certified devices via Google Play Protect. Despite these efforts, the open supply chain of uncertified AOSP devices remains a major security vulnerability.

Trend Micro and HUMAN’s Defense Platform have reported active defense efforts, but the malware’s ability to execute any payload means the risk is far from over.

Lessons from the December 2024 Sinkhole Operation

In late 2024, the German government sinkholed key BADBOX infrastructure, temporarily disrupting its operations. However, BADBOX 2.0 has since re-emerged with adaptive tactics and new delivery methods, underscoring the resilience and evolution of modern malware campaigns.

What Consumers Can Do

To reduce exposure to threats like BADBOX 2.0:

  • Avoid low-cost, uncertified Android devices
  • Use only official app marketplaces (Google Play, Samsung Galaxy Store, etc.)
  • Run regular malware scans and software updates
  • Check your device’s certification status via Google’s device list

Cybersecurity experts continue to stress collective vigilance and improved global supply chain oversight as the only long-term solution.

The BADBOX 2.0 malware represents a new era of embedded malware threats. Its widespread reach, sophisticated fraud capabilities, and deeply rooted backdoor access highlight the urgent need for stronger consumer awareness, secure supply chains, and cross-industry collaboration.

As global malware continues to evolve, understanding threats like BADBOX 2.0 is crucial for protecting users and networks worldwide.

More: New Method Detects Deepfake Videos


Like it? Share with your friends!

0