News

BadBox malware largely disrupted after infecting over 500,000 Android devices

Cybersecurity experts have disrupted BadBox 2.0, a malware infecting over 500,000 Android devices. Google removed 24 malicious apps, and domains were sinkholed to stop its spread.

BadBox malware largely disrupted after infecting over 500,000 Android devices

Agencias

  • March 8, 2025
  • Updated: July 1, 2025 at 10:14 PM
BadBox malware largely disrupted after infecting over 500,000 Android devices

Cybersecurity experts have successfully disrupted the operations of BadBox 2.0, a dangerous malware that turned over 500,000 Android devices into tools for cybercrime. The operation, led by HUMAN’s Satori Threat Intelligence team and several partners, removed dozens of malicious apps and sinkholed multiple domains, significantly reducing the malware’s impact.

Security researchers take down BadBox 2.0

BadBox 2.0, a successor to the original BadBox malware, was primarily targeting low-cost and uncertified Android devices. These compromised devices were used as residential proxies, enabling cybercriminals to conduct ad fraud, credential stuffing, and other malicious activities. While the exact method of infection remains unclear, researchers suspect it may have happened during early production or at some point in the supply chain.

The infected devices were identified as Android Open Source Project (AOSP) devices, which lack Google’s Play Protect certification. Mainly manufactured in China and distributed globally, these devices were particularly vulnerable to large-scale cyber threats. The malware rapidly expanded its reach, affecting smartphones, smart TVs, and streaming boxes, with significant infections reported in Brazil, the US, and Mexico.

Google and cybersecurity firms intervene

To combat the spread of BadBox 2.0, researchers removed 24 malicious apps from the Google Play Store and permanently banned the developers responsible. Additionally, they sinkholed several critical domains, effectively disrupting communication between infected devices and their command-and-control (C2) servers. Although the malware remains present in some devices, its operational capabilities have been severely crippled.

Security experts continue to emphasize the importance of purchasing devices from reputable manufacturers, keeping software up to date, and monitoring for any suspicious activity. With ongoing vigilance, users can better protect themselves from similar cyber threats in the future.

Latest Articles

Loading next article