Threat analysis by The RabitaNoor (RBTN) Cyber Research Center

BADBOX 2.0 Android Malware Campaign Analysis

The goals of this document is to provide technical and strategic analysis of a much larger document, audio etc.

The document is a product of the RBTN - CYOI Pulpit


Main Image

Photo by Yeshi Kangrang


Document Summary

The FBI has issued a warning about the BADBOX 2.0 malware campaign, which has infected over 1 million consumer devices, including Android-based smart TVs, streaming boxes, and IoT devices. The malware converts these devices into residential proxies for malicious activities. BADBOX 2.0 is commonly found on devices manufactured in China and has been observed in 222 countries, with the highest infection rates in Brazil, the United States, Mexico, and Argentina. The malware is pre-installed or introduced through malicious firmware updates and applications. Despite previous disruptions, the botnet continues to grow. The FBI advises consumers to monitor their IoT devices for suspicious activity and avoid downloading apps from unofficial sources.

Analysis

Overview

Timestamp: 2025-06-05

Title: BADBOX 2.0 Android Malware Campaign Analysis

Severity: High

The BADBOX 2.0 malware campaign involves cybercriminals exploiting Android-based IoT devices to create a botnet for malicious activities. The adversaries leverage pre-installed malware and malicious apps to compromise devices, which are then used as residential proxies. The infrastructure includes C2 servers and a global botnet, with victims primarily in Brazil, the USA, Mexico, and Argentina.

Adversary

Adversary: Cybercriminals exploiting BADBOX 2.0 malware for malicious activities.

Motivation: Financial gain through ad fraud and credential stuffing.

Sophistication: Moderate, leveraging pre-installed malware and malicious apps.

TTPs:

Capability

Capability: BADBOX 2.0 malware capable of converting devices into proxies.

Tools: BADBOX 2.0 malware

Evasion: Disabling Google Play Protect

Infrastructure

Description: Botnet infrastructure leveraging compromised IoT devices.

C2 Servers: Command and control servers for BADBOX 2.0

Botnets: BADBOX 2.0 botnet

Communication Protocols: HTTP, HTTPS

Victim Profile

Targets: Consumers with Android-based IoT devices, primarily in Brazil, USA, Mexico, and Argentina.

Industry: Consumer electronics

Assets: IoT devices, Smart TVs, Streaming boxes

Data at Risk: Network traffic, Device control

Impact: High, due to widespread infection and use in malicious activities.

References