Badbox is back and a million Android devices were rear • The register


Human Security’s Sori Research Team said they found a new variant of Badbox malware remotely controllable, and up to a million infected Android devices that execute it to form a massive botnet.

The Infosec outfit spotted the first epidemic of Badbox in 2023, when she found television devices connected to the Internet in Android out of brand – kit imitations like Apple TV, Roku or Amazon Fire Sticks – contaminated by malware that participated in a colossal ad -fraud network called Peachpit. About 74,000 aircraft participated in the first Badbox cluster.

Badbox 2.0 Apparently, targets Android again, this temporal equipment running the Open Source Android Basic, AKA AOSP, and was spotted in un cheap brand phones, more net connected television boxes, tablets sold for use in cars and digital projectors.

Gavin Reid, ciso of human security, said The register Botnet breeders sometimes distribute their nasty software by working in the supply chain to buy cheap hardware, bounce it back, install their evil code in the firmware or an application that users are likely to use often, then resell poisoned products.

Human security researchers have also said they found more than 200 applications infected with malware that participates in the botnet, all hosted in third -party Android application stores. Most are “evil twins” of legitimate programs subject to the Google Play Store. Once these applications are legitimate, crooks create and publish very similar packages on third -party software souks – with malware. Users of third -party application stores – which are large in the developing world – are due in the download and installation of evil twins.

“The Badbox 2.0 scheme is larger and much worse than what we saw in 2023 in terms of increased types of targeted devices, the number of infected devices, the different types of fraud and the complexity of the program,” said Reid.

This can also be the result of the collaboration between the crims, because the researchers of Sator have identified four sets of disbelievers which they believe in each aspect different of the Badbox operation.

All infected devices are made in China, and the malicious software they run produced network traffic from 222 countries and territories (the UN recognizes 248) since the Botnet 2.0 was spotted for the last time in the last fall in the North.

The Botnet Network is monetized with hidden advertisements that users never see, but advertisers who are informed have been global. Another tactic is click on advertising.

Lindsay Kaye, vice-president of intelligence for human security threats, told us that the Botnet operators worked hard to disguise their fraudulent activities. If a legitimate advertising network detects an entire load of advertisements or clicks in a country like China, it will increase a red flag. So, if this fraud takes place on boxes connected to the Internet around the world, it is more difficult to locate and block.

“If you come from a server in China, it can be very easy for people to detect all the data that comes as advertising fraud, right?

“But if you come from a residential house where 99.9% of traffic is good, then they [the botnet operator] Just turn it on, do a little advertising fraud, then go to someone on the road. They can mix this and be extremely effective, then get around a lot of controls that most companies have in place to prevent fraud. “”

Satori has also found evidence that malware steals passwords entered into the infected equipment.

Do you have one? The moment may be the right time to eliminate the catch … Examples of potentially infected devices from human security

Click to enlarge. Source: Human security

The botnet could be used for service denial attacks, but Reid thinks that its operators know that it would attract unwanted attention, hence discreet discreet fraud.

At its peak, Badbox 2.0 infected nearly a million devices, but this number was halved thanks to the work of Human Security, Google, Trend Micro and the Shadowserver Foundation for non -profit. These players worked to identify and close the command and control servers directing the diverted equipment, Google looked at suspicious Android traffic, and the man alerted the companies of advertising fraud from these devices.

Another good news is that infections seem to have been taken early. Kaye noted that during the examination of the malware modules, many were marked “test”, indicating that the botnet was at its beginnings.

However, she believes that it is likely that criminals behind Badbox 2.0 will try to rekindle their evil network and hide their activities by changing behavior – as was the case after the researchers found the first badbox network. ®

Leave a Reply

Your email address will not be published. Required fields are marked *