News
BadBox malware largely disrupted after infecting over 500,000 Android devices
Cybersecurity experts have disrupted BadBox 2.0, a malware infecting over 500,000 Android devices. Google removed 24 malicious apps, and domains were sinkholed to stop its spread.

- March 8, 2025
- Updated: July 1, 2025 at 10:14 PM

Cybersecurity experts have successfully disrupted the operations of BadBox 2.0, a dangerous malware that turned over 500,000 Android devices into tools for cybercrime. The operation, led by HUMAN’s Satori Threat Intelligence team and several partners, removed dozens of malicious apps and sinkholed multiple domains, significantly reducing the malware’s impact.
Security researchers take down BadBox 2.0
BadBox 2.0, a successor to the original BadBox malware, was primarily targeting low-cost and uncertified Android devices. These compromised devices were used as residential proxies, enabling cybercriminals to conduct ad fraud, credential stuffing, and other malicious activities. While the exact method of infection remains unclear, researchers suspect it may have happened during early production or at some point in the supply chain.
The infected devices were identified as Android Open Source Project (AOSP) devices, which lack Google’s Play Protect certification. Mainly manufactured in China and distributed globally, these devices were particularly vulnerable to large-scale cyber threats. The malware rapidly expanded its reach, affecting smartphones, smart TVs, and streaming boxes, with significant infections reported in Brazil, the US, and Mexico.
Google and cybersecurity firms intervene
To combat the spread of BadBox 2.0, researchers removed 24 malicious apps from the Google Play Store and permanently banned the developers responsible. Additionally, they sinkholed several critical domains, effectively disrupting communication between infected devices and their command-and-control (C2) servers. Although the malware remains present in some devices, its operational capabilities have been severely crippled.
Security experts continue to emphasize the importance of purchasing devices from reputable manufacturers, keeping software up to date, and monitoring for any suspicious activity. With ongoing vigilance, users can better protect themselves from similar cyber threats in the future.
Latest from Agencias
You may also like
- News
The Sonic game that was such a failure that it disappeared after a year without anyone mourning it
Read more
- News
The developers of Dead Cells explain why they decided not to make a sequel to their game
Read more
- News
There is a solution to improve your aim in Battlefield 6 and it doesn't require any mods
Read more
- News
This board game has raised 4 million dollars on Kickstarter and has encountered a problem: it doesn't know what else to offer
Read more
- News
Hollow Knight: Silksong players discover how to destroy their games for fun
Read more
- News
One of the most iconic series of the 2000s will return with a reboot featuring a female lead and more prison breaks
Read more