Wednesday, April 16, 2025
HomeAndroidBADBOX Botnet Surges: Over 190,000 Android Devices Infected, Including LED TVs

BADBOX Botnet Surges: Over 190,000 Android Devices Infected, Including LED TVs

Published on

SIEM as a Service

Follow Us on Google News

The BADBOX botnet, a sophisticated malware operation targeting Android-based devices, has now infected over 192,000 systems globally.

Originally confined to low-cost and off-brand devices, the malware has expanded its reach to include well-known brands such as Yandex 4K QLED TVs and Hisense smartphones.

This alarming development highlights the growing risks of supply chain vulnerabilities in consumer electronics.

- Advertisement - Google News

BADBOX malware is embedded directly into the firmware of affected devices, meaning that users unbox products already compromised.

Once connected to the internet, these devices immediately establish communication with command-and-control (C2) servers operated by cybercriminals.

The malware’s capabilities include turning infected devices into residential proxies, conducting ad fraud, stealing two-factor authentication codes, and installing additional malicious payloads.

Such activities not only compromise user security but also enable attackers to exploit the devices for broader cybercrime operations.

Supply Chain Compromise at the Core

Researchers believe BADBOX’s infiltration stems from supply chain attacks during manufacturing or distribution.

The malware is thought to be derived from the Triada family of Android malware, known for its stealthy backdoor operations.

Devices infected with BADBOX are sold through popular online retailers, making it nearly impossible for consumers to detect the threat before purchase.

A recent sinkhole operation by cybersecurity researchers revealed over 160,000 unique IPs attempting to connect to a single BADBOX C2 server within 24 hours.

This underscores the botnet’s rapid growth and widespread impact across countries such as Russia, China, India, Brazil, Belarus, and Ukraine.

Implications and Response

According to the Censys report, BADBOX’s ability to infect trusted brands raises serious concerns about supply chain integrity and device security.

The malware operates at a firmware level, making it nearly impossible for users to remove without replacing the entire firmware a task beyond most consumers’ capabilities.

German authorities recently disrupted part of the botnet by sinkholing one of its C2 servers, severing communication for approximately 30,000 devices in the country.

Experts recommend immediate action for affected users: disconnect compromised devices from networks and replace them if possible.

Manufacturers are urged to strengthen their supply chain security measures to prevent future incidents.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Target Investors Through Fraud Networks to Steal Financial Data

Hackers have launched sophisticated schemes designed to defraud investors and steal their financial data....

Hackers Weaponize Gamma Tool Through Cloudflare Turnstile to Steal Microsoft Credentials

Cybercriminals are exploiting an AI-powered presentation tool called Gamma to launch a multi-stage attack...

AI-Powered Bad Bots Account for 51% of Traffic, Surpassing Human Traffic for the First Time

Automated traffic generated by bad bots has for the first time surpassed human activity,...

Landmark Admin Suffers Major Breach, Exposing Data of 1.6M+ Users

Landmark Admin, LLC (“Landmark”), a Texas-based third-party administrator for life insurance carriers, has confirmed...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Target Investors Through Fraud Networks to Steal Financial Data

Hackers have launched sophisticated schemes designed to defraud investors and steal their financial data....

Hackers Weaponize Gamma Tool Through Cloudflare Turnstile to Steal Microsoft Credentials

Cybercriminals are exploiting an AI-powered presentation tool called Gamma to launch a multi-stage attack...

AI-Powered Bad Bots Account for 51% of Traffic, Surpassing Human Traffic for the First Time

Automated traffic generated by bad bots has for the first time surpassed human activity,...