Categories: Cyber Security News

Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices

Google has filed a lawsuit in New York federal court against the operators of the BadBox 2.0 botnet, marking a significant escalation in the tech giant’s fight against cybercriminal networks.

The malware campaign represents the largest known botnet of internet-connected television devices, compromising over 10 million uncertified Android devices worldwide.

BadBox 2.0 emerged as a sophisticated threat targeting devices running Android’s open-source software without Google’s integrated security protections.

Sponsored

The malware operators exploited the vulnerability gap in uncertified devices, pre-installing malicious code that remained dormant until activation.

This strategic approach allowed cybercriminals to establish persistent access to millions of connected TVs and streaming devices across global networks.

The botnet’s primary attack vector involved manufacturing partnerships with device producers who unknowingly distributed compromised hardware.

Once deployed in consumer environments, the infected devices conducted large-scale ad fraud operations, generating illegitimate revenue streams while remaining largely undetected by users.

Google researchers identified the malware’s sophisticated evasion techniques, which included mimicking legitimate network traffic patterns and operating during low-usage periods.

Google analysts working alongside HUMAN Security and Trend Micro researchers noted the malware’s advanced persistence mechanisms during their investigation.

Sponsored

The collaborative effort revealed BadBox 2.0’s ability to maintain command-and-control communications through encrypted channels, making traditional network monitoring ineffective.

Infection Mechanism and Persistence Architecture

The malware’s infection mechanism relies on firmware-level integration during the manufacturing process.

BadBox 2.0 embeds itself within the Android Open Source Project framework, establishing deep system-level access that survives factory resets.

The malware creates hidden service processes that communicate with remote servers, enabling operators to push additional payloads and update attack strategies dynamically.

Google’s Ad Traffic Quality team has since updated Google Play Protect to automatically identify and block BadBox-associated applications, while the FBI continues coordinating with international law enforcement agencies.

Boost detection, reduce alert fatigue, accelerate response; all with an interactive sandbox built for security teams -> Try ANY.RUN Now

The post Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Chichester adopts open enrollment, sets up trust fund to plan for potential state law

If open enrollment comes to pass, John White said his town could benefit from students…

1 hour ago

NIU at RVC engineering program celebrates 10 years of connecting local talent with area companies

Rock Valley College is celebrating a major milestone in their partnership with Northern Illinois University.…

3 hours ago

Critical Zero-Click Command Injection in AVideo Platform Allows Stream Hijacking

A critical vulnerability in AVideo, a widely used open-source video hosting and streaming platform. Tracked…

4 hours ago

‘Restyle the Runway’ event focuses on fashion and sustainability

Womanspace and Tad More Tailoring partnered to host the "Restyle the Runway" event Saturday afternoon…

4 hours ago

The Best Deals Today: Mario Kart World, Splatoon 3, LEGO Super Mario, and More

A new weekend has arrived, and today, you can save on Mario Kart World for…

11 hours ago

This website uses cookies.