1 million Android devices are infected with the BADBOX 2.0 Botnet for ad-fraud and surrogate abuse.

April 18, 2025Ravie LakshmananCyber Attack / Malware

An updated version of a huge advertisement fraud and personal substitute scheme called , which has at least four distinct threat actors identified as being involved in it, paints a picture of an connected cybercrime ecosystem.

According to recent findings from the HUMAN Satori Threat Intelligence and Research group, which were jointly published by Google, Trend Micro, Shadowserver, and other partners, this includes SalesTracker Group, MoYu Group, Lemon Group, and LongTV.

BADBOX 2.0 is the” complicated and extensive fraud procedure.” It has been referred to as the largest botnet of connected TV ( CTV ) devices ever discovered.

According to the business, “BADBOX 2.0, like its predecessor, begins with backdoors on low-cost consumer devices that allow threat actors to remotely weight fraud components.” These devices communicate with C2 ( C ) servers run by a number of distinct but cooperative threat actors.

The danger actors have a history of using a variety of methods, including hardware supply chain breaches and third-party marketplaces, to distribute apparently mild applications that have allegedly “loader” functionality to infiltrate these devices and applications with the backdoor.

The backdoor then makes the infected devices part of a larger malware that is used to generate click- and programmatic ad fraud and offers illegal personal proxy services.

  • Launching buried WebViews to produce fictitious ad revenue and launching hidden ads
  • clicking on adverts for monetary gain and tracking to low-quality regions
  • routing traffic to affected devices
  • Using the network to carry out account takeovers ( ATO ), create fake accounts, distribute malware, and carry out DDoS attacks

According to estimates, as many as one million devices, primarily made up of inexpensive Android tablets, connected TV ( CTV ) boxes, digital projectors, and car infotainment systems, have fallen victim to the BADBOX 2.0 scheme. All of the damaged components are produced in China and exported internationally. A majority of the infections have been reported in Brazil ( 37.6 % ), the United States ( 18.2 % ), Mexico ( 6.3 % ), and Argentina ( 5.3 % ).

After an unknown quantity of BADBOX 2.0 domains were hacked in an attempt to disconnect contacts with the sick devices, the operation has since been largely disrupted a next time in three months. A number of 24 of the malware’s creators were removed from the Play Store by Google for its portion. In December of this year, the German authorities removed a part of its infrastructure.

Google claimed that the sick tools are Android Open Source Project gadgets and never Android Television OS or Play Protect-certified Android products. Google doesn’t have a history of stability and compatibility tests if a device isn’t Play Protect certified. Android products that are Play Protect certified go through extensive testing to ensure quality and user safety.

The secret that constitutes the operation’s foundation is based on a Triada-style Android trojan. It is propagated in three different ways: a pre-installed part on the machine, fetched from a remote site when it is first fired, and saved via more than 200 trojanized versions of favorite programs from third-party stores. Codenamed BB2DOOR.

It’s claimed to be the creation of a threat group called MoYu Group, which promotes personal proxy services based on BADBOX 2.0-infected products. Other aspects of the system are in the hands of three different threat groups.

  • The initial BADBOX operation and a module that monitors the sick devices are connected to SalesTracker Group.
  • , which uses BADBOX 2.0 and an ad fraud campaign to connect to residential proxy services based on BADBOX and a network of HTML5 ( H5 ) game websites, is connected to the BADBOX 2.0 campaign.
  • A Malaysian online and media company called LongTV, whose two dozen apps are the inspiration for an “” ad fraud scheme, has launched an online campaign.

These organizations were linked to one another through shared infrastructure ( common C2 servers ) and historical and current business connections, according to HUMAN.

The most recent generation is a significant development and version, with attacks utilizing both diseased apps from third-party application stores and a more sophisticated malware that requires changing legitimate Android libraries to enable persistence.

Interesting, there is some evidence that suggests there are similarities between and BB2DOOR, another malware that has been known to precisely target off-brand Android TV containers.

The company continued,” The open-season character of the operation in particular makes the BADBOX 2.0 risk powerful in no small element.” Sick products may be instructed to carry out any cyberattacks a menace actor has developed with the secret in place.

According to the IAS Threat Lab, Google over 180 Android apps with a 56 million downloads as part of a powerful advertising fraud scheme known as Vapor, which uses fake Android apps to install infinite, aggressive full-screen capillary video ads.

Additionally, it comes as a result of a recent campaign that uses DeepSeek-themed decoy websites to entice unwary users to download an Android banking malware known as .

This article was interesting, did you find it? Follow us on and Twitter to access more exclusive content.

Leave a Comment