Categories: GBHackers

BADBOX Botnet Hacked 74,000 Android Devices With Customizable Remote Codes


BADBOX is a cybercriminal operation infecting Android devices like TV boxes and smartphones with malware before sale, which are often sold through reputable retailers and pose a significant threat to users due to their pre-installed malicious software, making detection challenging.

It previously thought eradicated has resurfaced with a significantly expanded reach, infecting over 192,000 Android devices, including smart TVs and smartphones from various manufacturers, primarily targeting users in Russia, China, India, Belarus, Brazil, and Ukraine. 

Stealthy Android TV malware, likely derived from Triada, compromises devices before sale, granting remote access to attackers, which was discovered in April 2023 and linked to the PEACHPIT botnet.

– Advertisement –
activity flow

It leverages compromised devices for nefarious activities like proxying, remote code execution, and ad fraud, which can silently install additional malicious modules, enabling threat actors to launch new attacks. 

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

The device, compromised by malicious firmware, automatically connects to a harmful network upon booting to receive and execute backdoors, which can then download and install additional malicious payloads without user authorization, enabling the attackers to carry out various undetected and evolving attacks.

POST telemetry

Recent operations, such as the German disruption of 30,000 BADBOX-infected devices, have only temporarily slowed the botnet’s spread.

Bitsight’s sinkholing efforts revealed over 160,000 unique IPs, including 100,000 from high-end Yandex 4K QLED Smart TVs, demonstrating the botnet’s persistent threat and its expansion beyond low-cost devices.

The malware infected high-end Yandex 4K Smart TVs, compromising their security and enabling potential remote control, which marks a significant expansion of the malware’s target range beyond typical Android devices.

Yandex Smart TVs and T963 smartphones are compromised, with over 160,000 unique IPs communicating daily, which are linked to a recently registered Swiss Yandex branch, are leaking user data, as evidenced by the disclosed MAC addresses and increasing traffic volume.

OS: Android

YNDX Smart TVs dominate traffic, originating mostly from Russia. Hisense phones follow, with lower activity from other regions, which aligns with the limited sales reach of YNDX TVs, confirmed by the manufacturer’s website – they primarily target Russia and neighboring countries.  

An investigation linked IPs to BADBOX C2 domains through shared URI paths and identified new potential C2 domains by SSL thumbprint analysis. 

Currently active domains

Two active domains showed BADBOX behavior and high pDNS requests, while others (yydsmd.com, etc.) used a different communication format (/ota/api/), suggesting a potential new BADBOX tactic. 

BADBOX malware, a global threat, leverages supply chains to infect various Android devices, including those from reputable brands like Yandex and Hisense, highlighting the growing sophistication of cybercriminals and the importance of vendor and partner trust to mitigate risks of data breaches and potential involvement in malicious activities. 

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free



Source link

Cybernoz

Share
Published by
Cybernoz

Recent Posts

Google Calendar Phishing Scam Targets Users with Malicious Invites

KEY SUMMARY POINTS Google Calendar Targeted: Hackers are exploiting Google Calendar’s features to send phishing… Read More

5 minutes ago

Exposing ‘Anom” – Inside The FBI’s Secret Encrypted Phone Company

Joseph Cox, author of the 2024 book “Dark Wire: The Incredible True Story of the… Read More

8 minutes ago

Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords

Dec 19, 2024Ravie LakshmananMalware / Botnet Juniper Networks is warning that Session Smart Router (SSR)… Read More

10 minutes ago

Juniper Warns of Mirai Botnet Targeting SSR Devices with Default Passwords

Dec 19, 2024Ravie LakshmananMalware / Botnet Juniper Networks is warning that Session Smart Router (SSR)… Read More

10 minutes ago

CCS cloud hosting deal with AWS under scrutiny as contract value soars by 89% after 15 months

The Crown Commercial Service’s (CCS) decision to increase its cloud hosting spend with Amazon Web… Read More

12 minutes ago

Hikvision Camera Driver Vulnerability Records Login details in Log files

A newly disclosed security vulnerability, tracked under CVE-2024-12569, has been identified in Hikvision camera drivers… Read More

35 minutes ago