Sunday, April 13, 2025
HomeAndroidBadBox Malware Infects 50,000+ Android Devices via 24 Apps on Google Play

BadBox Malware Infects 50,000+ Android Devices via 24 Apps on Google Play

Published on

SIEM as a Service

Follow Us on Google News

HUMAN’s Satori Threat Intelligence and Research team has uncovered a complex cyberattack dubbed “BADBOX 2.0,” an evolution of the previously disclosed BADBOX operation.

This sophisticated botnet has infected over 1 million consumer devices worldwide, with a significant portion compromised through 24 malicious apps on the Google Play Store.

The BADBOX 2.0 operation centers on a backdoor called BB2DOOR, which gives threat actors persistent privileged access to infected devices.

- Advertisement - Google News
BadBox Malware
A BADBOX C2 response

The backdoor is distributed through pre-installed apps on low-cost, off-brand Android Open Source Project devices, as well as through downloads from third-party marketplaces.

Multiple Threat Actor Groups Collaborate in Complex Scheme

Researchers identified four distinct threat actor groups involved in BADBOX 2.0: SalesTracker Group, MoYu Group, Lemon Group, and LongTV.

These groups collaborate, sharing infrastructure and targeting methods to maximize the botnet’s reach and effectiveness.

The operation enables various fraud schemes, including:

  1. Residential proxy services: Infected devices are used as proxy nodes, allowing attackers to hide their true IP addresses.
  2. Programmatic ad fraud: Hidden ads are rendered on devices, and hidden WebViews navigate to HTML5 game websites to generate fraudulent ad impressions.
  3. Click fraud: Infected devices are directed to visit low-quality domains and click on ads.
BadBox Malware
Request from new WebView

At its peak, the hidden ads scheme within BADBOX 2.0 generated 5 billion fraudulent bid requests per week.

Disruption Efforts and Ongoing Threats

According to the Report, HUMAN has worked closely with Google and other partners to disrupt BADBOX 2.0.

Google has taken action to terminate publisher accounts associated with the operation and has implemented measures to protect users through Google Play Protect.

However, the threat actors may adapt and relaunch their operations, as the supply chain enabling the implantation of backdoors remains intact.

Users are advised to limit app downloads to official marketplaces to reduce the risk of infection.

The BADBOX 2.0 investigation highlights the increasing sophistication of cybercriminal collaborations and emphasizes the need for robust, collective defense strategies in the cybersecurity industry.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...