HUMAN’s Satori Threat Intelligence and Research team has uncovered a complex cyberattack dubbed “BADBOX 2.0,” an evolution of the previously disclosed BADBOX operation.
This sophisticated botnet has infected over 1 million consumer devices worldwide, with a significant portion compromised through 24 malicious apps on the Google Play Store.
The BADBOX 2.0 operation centers on a backdoor called BB2DOOR, which gives threat actors persistent privileged access to infected devices.
The backdoor is distributed through pre-installed apps on low-cost, off-brand Android Open Source Project devices, as well as through downloads from third-party marketplaces.
Researchers identified four distinct threat actor groups involved in BADBOX 2.0: SalesTracker Group, MoYu Group, Lemon Group, and LongTV.
These groups collaborate, sharing infrastructure and targeting methods to maximize the botnet’s reach and effectiveness.
The operation enables various fraud schemes, including:
At its peak, the hidden ads scheme within BADBOX 2.0 generated 5 billion fraudulent bid requests per week.
According to the Report, HUMAN has worked closely with Google and other partners to disrupt BADBOX 2.0.
Google has taken action to terminate publisher accounts associated with the operation and has implemented measures to protect users through Google Play Protect.
However, the threat actors may adapt and relaunch their operations, as the supply chain enabling the implantation of backdoors remains intact.
Users are advised to limit app downloads to official marketplaces to reduce the risk of infection.
The BADBOX 2.0 investigation highlights the increasing sophistication of cybercriminal collaborations and emphasizes the need for robust, collective defense strategies in the cybersecurity industry.
Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free
Zero Trust is a security framework that operates under the assumption that no implicit trust…
Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to streamline…
Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious purposes,…
Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive their…
Trend Micro's Managed XDR team has recently investigated a sophisticated Business Email Compromise (BEC) attack…
Kudelski Security Research recently published an article detailing advanced methods for tracking and analyzing threat…