BADBOX 2.0 Botnet Weaponizes Uncertified Devices for Proxies, Fraud, and Credential Theft

Threat Group: SalesTracker Group, MoYu Group, Lemon Group, LongTV
Threat Type: Android Malware Botnet
Exploited Vulnerabilities: Supply chain compromises, malicious third-party apps, uncertified Android devices
Malware Used: BB2DOOR (variant of Triada)
Threat Score: 🔥 Critical (9.1/10)
Last Threat Observation: June 7, 2025
Overview
BADBOX 2.0 is a critical evolution of a previously disrupted Android malware campaign, now representing a global cybercrime threat. First identified in 2023 and rapidly evolving post-disruption in late 2024, this campaign has infected over one million Android-based devices globally. Leveraging deep supply chain compromises and widespread distribution through malicious apps and drive-by downloads, BADBOX 2.0 creates a persistent, monetized botnet.
The malware targets uncertified Android Open Source Project (AOSP) devices, including smart TVs, tablets, and other IoT hardware, particularly low-cost electronics manufactured in China. Its use of BB2DOOR, a Triada-based backdoor, ensures deep integration and persistence.
Its global reach and multilayered attack strategy make BADBOX 2.0 a formidable challenge for individuals, organizations, and governments. At its core are four interconnected threat groups, each managing a segment of the infrastructure or monetization.
Key Details
- Delivery Method: Supply chain compromise, malicious third-party applications, drive-by downloads
- Primary Targets: Low-cost AOSP devices (e.g., CTVs, projectors, infotainment systems)
- Botnet Size: Over 1 million devices across 222 countries
- Peak Fraud Volume: 5 billion bid requests weekly
- Groups Involved: SalesTracker (C2), MoYu (BB2DOOR dev & proxy sales), Lemon (ad fraud), LongTV ("evil twin" adware apps)
- Geography: Major infections in Brazil (37.6%), U.S. (18.2%), Mexico (6.3%), Argentina (5.3%)
Obfuscation & Persistence:
- Malicious library:
libanl.so
- Obfuscated C2 calls, modified XXTEA encryption, modified system libraries
Attack Vectors
BADBOX 2.0 utilizes a layered infection strategy, targeting both the digital supply chain and individual user behavior to maximize its reach and stealth:
- Pre-installed Malware (Supply Chain Compromise):
- Devices are shipped with BB2DOOR already embedded in the firmware. This ensures infection upon first boot without any user interaction.
- Primarily affects uncertified devices from lesser-known manufacturers with limited quality assurance or vetting procedures.
- Often advertised as "unlocked" devices with enhanced features such as free streaming, making them attractive to budget-conscious consumers.
- Malicious Third-Party Applications:
- Over 200 known "evil twin" applications mimic popular apps but contain hidden backdoors.
- These apps are distributed via third-party app stores and websites that lack security screening processes.
- Users seeking modified or free versions of popular apps are particularly at risk.
- Drive-by Downloads:
- Leveraged through compromised websites or fraudulent ads.
- Simply visiting a malicious site can trigger an automatic download of the malware, exploiting browser vulnerabilities or misleading users into granting permissions.
- These tactics are increasingly common in mobile-focused malvertising campaigns.
- Hidden App Installers & Content Applications:
- BADBOX 2.0 also spreads through built-in content delivery systems on infected devices.
- Fake update prompts or media suggestions can install secondary payloads when accepted by the user.
- Rogue OTA (Over-The-Air) Updates:
- In some cases, manufacturers or distributors push rogue OTA updates embedding BB2DOOR post-sale.
- These updates appear legitimate and are difficult for users to distinguish from safe system maintenance.
- Local ADB Exploits (Advanced):
- While less common, there is emerging evidence of infected devices exploiting Android Debug Bridge (ADB) when exposed, potentially compromising devices on the same network.
This multifaceted vector strategy demonstrates BADBOX 2.0's adaptability and the critical need for defenses that account for both pre-purchase integrity and post-sale user behavior.
Indicators of Compromise (IoCs)
Device Models Targeted by Threat Actors
Amlogic/X96 - X96Max_Plus2 | Amlogic/X96 - X96MATE_PLUS | Amlogic/X96 - X96Q |
Amlogic/X96 - X96Q_PRO | Amlogic/X96 - X96Q_PR01 | Amlogic/X96 - X96Q_Max_P |
Amlogic/X96 - X96QPRO-TM | Amlogic/X96 - X96_S400 | Amlogic/X96 - X96mini |
Amlogic/X96 - X96mini_Plus1 | Amlogic/X96 - X96mini_RP | Allwinner - H6 |
Allwinner - Q96L2 | Fujicom - SmartTV | Generic - MBOX |
Generic - Mbox | Generic - SMART_TV | Generic - Smart |
Generic - TVBOX | Google/SEI Robotics - ADT-3 | H96 - Z6 |
iSinbox - I96 | iSinbox - iSinbox | iSinbox - isinbox |
LongTV - GN7501E | MECOOL - KM1 | MECOOL - KM6 |
MECOOL - KM7 | MECOOL - KM9PRO | Orbsmart - TR43 |
Rockchip - Q9 Stick | Rockchip - R11 | Rockchip - X88 |
Rockchip/MXQ - MXQ9PRO | Rockchip/Various - MX10PRO | Sunvell - S168 |
Tanix - TX3mini | Tanix - TXCZ | TouYinger - Projector_T6P |
Transpeed - Transpeed | Unisoc - SP7731E | Unisoc - ums512_1h10_Natv |
Unknown - A15 | Unknown - HY-001 | Unknown - OCBN |
Unknown - TV007 | Unknown - TV008 | Unknown - Xtv77 |
Unknown Generic - TV98 | Various - AV-M9 | Various - GameBox |
Various OEM - M8SPROW | Various - X98K |
C2 Domains
100ulife[.]com | 1ztop[.]work | 99soya[.]shop |
ad3g[.]com | admoyu[.]com | ads-goal[.]com |
ai-goal[.]com | apotube[.]com | app-goal[.]com |
appclicking[.]com | astrolink[.]cn | bitemores[.]com |
bltproxy[.]com | bluefish[.]work | bullet-proxy[.]com |
catmore88[.]com | catmos99[.]com | cbphe[.]com |
cbpheback[.]com | clickby[.]net | clocksyn[.]com |
coslogdydy[.]in | cxlcyy[.]com | cxzyr[.]com |
dazzl[.]vip | dc16888888[.]com | dcylog[.]com |
dqmop[.]com | duoduodev[.]com | easyjoy[.]me |
echojoy[.]xyz | finemob[.]com | firehub[.]link |
firehub[.]work | flyermobi[.]com | fuhidd[.]com |
g1ee[.]com | giddy[.]cc | goologer[.]com |
heygames[.]club | huulog[.]com | huuww[.]com |
ipforyou[.]top | ipmoyu[.]com | jasmine[.]land |
jolted[.]vip | joyfulxx[.]com | jutux[.]work |
logcer[.]com | long[.]tv | meiboot[.]com |
meisvip[.]com | moonhub[.]work | motiyu[.]net |
moyi88[.]xyz | moyix[.]com | msohu[.]online |
msohu[.]shop | mtcpmpm[.]com | mtcprogram[.]com |
mtcpuouo[.]com | mymoyu[.]shop | navnow[.]xyz |
net-goal[.]com | pcxrl[.]com | pcxrlback[.]com |
pccyy[.]com | petrel-ip[.]com | pixelscast[.]com |
pixlo[.]cc | pm2za[.]cc | qazwsxedc[.]xyz |
qocoll[.]com | qulogger[.]com | randomhow[.]com |
retrofitxer[.]com | rzless[.]work | shanhulan[.]cn |
simplekds[.]me | soyatea[.]online | sparkjoy[.]cc |
supportdatainput[.]top | sustat[.]com | syloger[.]com |
sysbinder[.]com | sysbinder[.]xyz | tvsnapp[.]com |
ttyunos[.]com | tuding[.]xyz | veezy[.]site |
vividweb[.]work | vmud[.]net | wildpettykiwi[.]com |
wildpettykiwi[.]info | wildpettykiwi[.]xyz | wotads[.]com |
ycxad[.]com | ycxrl[.]com | ycxrldow[.]com |
yeyeyeye[.]xyz | yxcrl[.]com | yydsma[.]com |
yydsmb[.]com | yydsmd[.]com | yydsmr[.]com |
ziyemy[.]shop | ztword[.]com | zxcvbnmasdfghjkl[.]xyz |
Mitigation and Prevention
- Procurement Policies:
- Use only Google Play Protect-certified Android devices
- Conduct supply chain security audits
- Network Security:
- Segment IoT networks
- Monitor for unusual DNS/C2 traffic
- Deploy behavioral analytics
- Application Security:
- Enforce official app store usage
- Vet apps in BYOD environments
- User Awareness:
- Educate on unofficial app risks
- Discourage "free streaming" devices
- Incident Response:
- Deploy Android EDR tools
- Build playbooks for Android/IoT response
- Prepare for firmware re-flash or device replacement
Risk Assessment
Severity: Critical
Impact:
- Financial losses through ad fraud and proxy abuse
- Privacy breaches via credential theft and OTP harvesting
- Operational disruption via DDoS and reputational damage
- Difficult remediation requiring device re-flashing or replacement
Conclusion
BADBOX 2.0 exemplifies a modern, persistent Android threat combining deep supply chain infiltration, organizational criminal cooperation, and advanced malware engineering. With multiple revenue streams and resilience strategies, it poses an enduring risk to organizations and end users worldwide. Preventing future infections requires a shift to proactive supply chain validation, enforced procurement policies, and sustained behavioral monitoring.
Sources
- HUMAN Security –The BADBOX 2.0 Operation
- Dark Reading - BADBOX 2.0 Targets Home Networks, FBI Warns
- BleepingComputer - FBI: BADBOX 2.0 Android malware infects millions of consumer devices