BADBOX 2.0 Android malware infects millions of consumer devices

The FBI is warning that the BADBOX 2.0 malware campaign has infected over 1 million home Internet-connected devices, converting consumer electronics into residential proxies that are used for malicious activity.

The BADBOX botnet is commonly found on Chinese Android-based smart TVs, streaming boxes, projectors, tablets, and other Internet of Things (IoT) devices.

“The BADBOX 2.0 botnet consists of millions of infected devices and maintains numerous backdoors to proxy services that cyber criminal actors exploit by either selling or providing free access to compromised home networks to be used for various criminal activity,” warns the FBI.

These devices come preloaded with the BADBOX 2.0 malware botnet or become infected after installing firmware updates and through malicious Android applications that sneak onto Google Play and third-party app stores.

“Cyber criminals gain unauthorized access to home networks by either configuring the product with malicious software prior to the users purchase or infecting the device as it downloads required applications that contain backdoors, usually during the set-up process,” explains the FBI.

“Once these compromised IoT devices are connected to home networks, the infected devices are susceptible to becoming part of the BADBOX 2.0 botnet and residential proxy services4 known to be used for malicious activity.”

Once infected, the devices connect to the attacker’s command and control (C2) servers, where they receive commands to execute on the compromised devices, such as:

  • Residential Proxy Networks: The malware routes traffic from other cybercriminals through victims’ home IP addresses, masking malicious activity.
  • Ad Fraud: BADBOX can load and click ads in the background, generating ad revenue for the threat actors.
  • Credential Stuffing: By leveraging victim IPs, attackers attempt to access other people’s accounts using stolen credentials.

BADBOX 2.0 evolved from the original BADBOX malware, which was first identified in 2023 after it was found pre-installed in cheap, no-name Android TV boxes like the T95.

Over the years, the malware botnet continued expanding until 2024, when Germany’s cybersecurity agency disrupted the botnet in the country by sinkholing the communication between infected devices and the attacker’s infrastructure, effectively rendering the malware useless.

However, that did not stop the threat actors, with researchers saying they found the malware installed on 192,000 devices a week later. Even more concerning, the malware was found on more mainstream brands, like Yandex TVs and Hisense smartphones.

Unfortunately, despite the previous disruption, the botnet continued to grow, with HUMAN’s Satori Threat Intelligence stating that over 1 million consumer devices had become infected by March 2025.

This new larger botnet is now being called BADBOX 2.0 to indicate a new tracking of the malware campaign.

“This scheme impacted more than 1 million consumer devices. Devices connected to the BADBOX 2.0 operation included lower-price-point, “off brand”, uncertified tablets, connected TV (CTV) boxes, digital projectors, and more,” explains HUMAN.

“The infected devices are Android Open Source Project devices, not Android TV OS devices or Play Protect certified Android devices. All of these devices are manufactured in mainland China and shipped globally; indeed, HUMAN observed BADBOX 2.0-associated traffic from 222 countries and territories worldwide.”

Researchers at HUMAN estimate that the BADBOX 2.0 botnet spans 222 countries, with the highest number of compromised devices in Brazil (37.6%), the United States (18.2%), Mexico (6.3%), and Argentina (5.3%).

BadBox 2.0 Global Distribution
BADBOX 2.0 Global Distribution
Source: HUMAN Satori

In a joint operation led by HUMAN’s Satori team and Google, Trend Micro, The Shadowserver Foundation, and other partners, the BADBOX 2.0 botnet was disrupted again to prevent over 500,000 infected devices from communicating with the attacker’s servers.

However, even with that disruption, the botnet continues to grow as consumers purchase more compromised products and connect them to the Internet.

A list of devices known to be impacted by the BADBOX malware are listed below:

















Device Model Device Model Device Model Device Model
TV98 X96Q_Max_P Q96L2 X96Q2
X96mini S168 ums512_1h10_Natv X96_S400
X96mini_RP TX3mini HY-001 MX10PRO
X96mini_Plus1 LongTV_GN7501E Xtv77 NETBOX_B68
X96Q_PR01 AV-M9 ADT-3 OCBN
X96MATE_PLUS KM1 X96Q_PRO Projector_T6P
X96QPRO-TM sp7731e_1h10_native M8SPROW TV008
X96Mini_5G Q96MAX Orbsmart_TR43 Z6
TVBOX Smart KM9PRO A15
Transpeed KM7 iSinbox I96
SMART_TV Fujicom-SmartTV MXQ9PRO MBOX
X96Q isinbox Mbox R11
GameBox KM6 X96Max_Plus2 TV007
Q9 Stick SP7731E H6 X88
X98K TXCZ  

Symptoms of a BADBOX 2.0 infection include suspicious app marketplaces, disabled Google Play Protect settings, TV streaming devices advertised as being unlocked or able to access free content, devices from unknown brands, and suspicious Internet traffic.

Furthermore, this malware is commonly found on devices not Google Play Protect certified.

The FBI strongly advises consumers to protect themselves from the botnet by following these steps:

  • Assess all IoT devices connected to home networks for suspicious activity.
  • Never download apps from unofficial marketplaces offering “free streaming” apps.
  • Monitor Internet traffic to and from home networks.
  • Keep all devices in your home updated with the latest patches and updates.

Finally, if you suspect your device is compromised, you should isolate it from the rest of the network and restrict its Internet access, effectively disrupting the malware.

Manual patching is outdated. It’s slow, error-prone, and tough to scale.

Join Kandji + Tines on June 4 to see why old methods fall short. See real-world examples of how modern teams use automation to patch faster, cut risk, stay compliant, and skip the complex scripts.

Source link