Article Details
Scrape Timestamp (UTC): 2025-03-07 01:55:27.313
Source: https://www.theregister.com/2025/03/07/badbox_botnet_returns/
Original Article Text
Click to Toggle View
The Badbox botnet is back, powered by up to a million backdoored Androids. Best not to buy cheap hardware and use third-party app stores if you want to stay clear of this vast ad fraud effort. Human Security’s Satori research team says it has found a new variant of the remote-controllable Badbox malware, and as many as a million infected Android devices running it to form a massive botnet. The infosec outfit spotted the first Badbox outbreak in 2023, when it found off-brand Android-powered internet-connected TV devices – knockoffs of kit like Apple TV, Roku, or Amazon Fire Sticks – contaminated with malware that participated in a colossal ad-fraud network called Peachpit. Around 74,000 devices participated in the first Badbox cluster. Badbox 2.0 apparently again targets Android, this time hardware running the base Android Open Source Project, aka AOSP, and has been spotted in cheap off-brand phones, more net-connected TV boxes, tablets sold for use in cars, and digital projectors. Gavin Reid, CISO of Human Security, told The Register the botnet's herders sometimes spread their software nasty by intervening in the supply chain to buy cheap hardware, rebadge it, install their evil code in either firmware or an app users are likely to use often, then resell the poisoned products. The Human Security researchers also said they found more than 200 apps infected with malware that participates in the botnet, all hosted on third-party Android app stores. Most are "evil twins" of legit programs submitted to Google's Play Store. After those legit apps appear, crooks create and publish very similar packages on third-party software souks – complete with the malware. Users of third-party app stores – which are big in the developing world - are fooled into downloading and installing the evil twins. "The Badbox 2.0 scheme is bigger and far worse than what we saw in 2023 in terms of the uptick in types of devices targeted, the number of devices infected, the different types of fraud conducted, and the complexity of the scheme," Reid said. It may also be the result of collaboration among crims, as Satori researchers have identified four sets of miscreants they believe each run different aspects of the Badbox operation. All the infected devices are made in China, and the malware they run has produced network traffic from 222 countries and territories (the UN recognizes 248) since the 2.0 botnet was first spotted last northern autumn. The network botnet is monetized with hidden ads that users never see, but which advertisers are told have been eyeballed. Ad-click fraud is another tactic. Lindsay Kaye, vice president of threat intelligence at Human Security, told us the botnet’s operators work hard to disguise their fraudulent activities. If a legit ad network detects a whole load of ad views or clicks in a country like China, it'll raise a red flag. So, if that fraud takes place on internet-connected boxes around the world, it's harder to spot and block. "If you're coming from a server in China, it may be very easy for people to detect all of the data that's coming as ad fraud, right? None of it's good," she said. "But if you're coming from a residential house where 99.9 percent of the traffic's good, and then they [the botnet operator] just switch it on for a little bit, do a little bit of ad fraud, and then switch over to someone down the road. They can blend this in and be extremely effective, and then kind of get around a lot of the controls that most companies have in place to prevent fraud." Satori also found evidence that the malware is stealing passwords entered into infected hardware. Got one of these? Now might be a good time to pull the plug ... Human Security's examples of potentially infected devices Click to enlarge. Source: Human Security The botnet could be used for denial of service attacks, but Reid thinks its operators know doing so would attract unwelcome attention, hence the quiet low-key fraud. At its peak Badbox 2.0 infected nearly a million devices, but that number has been halved thanks to work by Human Security, Google, Trend Micro, and the non-profit Shadowserver Foundation. Those players worked to identify and shut down command-and-control servers directing the hijacked equipment, Google has watched for suspicious Android traffic, and Human has alerted companies to ad fraud coming from these devices. Another piece of good news is that the infections appear to have been caught early. Kaye noted that when examining the modules of the malware, many were marked "test," indicating the botnet was in its early days. However, she feels it’s likely the criminals behind Badbox 2.0 will try to revive their evil network, and hide their activities by changing behavior – as was the case after researchers found the first Badbox network.
Daily Brief Summary
The Badbox 2.0 botnet has infected nearly a million Android devices, redesploying a vast ad fraud network.
Human Security's research team detected malware variants in cheap, off-brand Android hardware and third-party app stores.
Infected devices include TVs, phones, car tablets, and projectors, all sourced from China and showing global network traffic.
The botnet hides its fraudulent ad activities by mimicking legitimate user behaviors across devices worldwide.
Over 200 third-party Android applications were found infected, often mimicking legitimate versions found on Google's Play Store.
The scheme appears larger and more sophisticated than previous iterations, potentially involving collaboration across multiple criminal groups.
Efforts by Human Security, Google, Trend Micro, and Shadowserver Foundation have reduced the botnet by half by targeting command-and-control servers.
Despite some mitigation, there is concern around potential resurgence and adaptation of the botnet by its operators.