Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Newegg’s Ryzen 7 9850X3D combo bundle offers over $500 in savings on three key components, including 64GB DDR5 RAM

    Tenku Pocket 8 micro laptop launched with 8-inch touch display and 8-core Intel Alder Lake-N CPU

    Endorfy Signum M30 Air and M30 ARGB arrive as brand-new micro ATX PC towers

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026
    • Business

      How Smarsh built an AI front door for regulated industries — and drove 59% self-service adoption

      February 24, 2026

      Where MENA CIOs draw the line on AI sovereignty

      February 24, 2026

      Ex-President’s shift away from Xbox consoles to cloud gaming reportedly caused friction

      February 24, 2026

      Gartner: Why neoclouds are the future of GPU-as-a-Service

      February 21, 2026

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026
    • Crypto

      BitMine Buys $93 Million in ETH, but Ethereum Slides as Holders Resume Selling

      February 24, 2026

      XRP Ledger Sets Multiple Key Records in February Despite Price Decline

      February 24, 2026

      Bhutan Rolls Out Solana-Backed Visas Even As Demand Stays Weak

      February 24, 2026

      ZachXBT Teases Major Crypto Exposé Ahead of Feb. 26 — How Is Smart Money Positioned?

      February 24, 2026

      Acurast turns 225,000 smartphones into a secure AI network on Base

      February 24, 2026
    • Technology

      Newegg’s Ryzen 7 9850X3D combo bundle offers over $500 in savings on three key components, including 64GB DDR5 RAM

      February 25, 2026

      Tenku Pocket 8 micro laptop launched with 8-inch touch display and 8-core Intel Alder Lake-N CPU

      February 25, 2026

      Endorfy Signum M30 Air and M30 ARGB arrive as brand-new micro ATX PC towers

      February 25, 2026

      Ditch the Adobe subscription: This PDF editor is yours for life for $25

      February 25, 2026

      Her AI agent nuked 200 emails. This guardrail stops the next disaster

      February 25, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»The FBI Warns of BADBOX 2.0 – A Cyberattack That Targets Home IoT Devices
    Technology

    The FBI Warns of BADBOX 2.0 – A Cyberattack That Targets Home IoT Devices

    TechAiVerseBy TechAiVerseJune 11, 2025No Comments9 Mins Read3 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    The FBI Warns of BADBOX 2.0 – A Cyberattack That Targets Home IoT Devices
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    The FBI Warns of BADBOX 2.0 – A Cyberattack That Targets Home IoT Devices

    Key Takeaways

    • The FBI has warned users of BADBOX 2.0 – a malicious software that infects home devices like TVs, streaming devices, and vehicle infotainment systems.
    • Once compromised, these devices are added to the botnet network and used as proxies for malicious activities.
    • Users need to practice vigilance by avoiding purchases from unrecognized brands and checking network traffic for suspicious activity.

    The Federal Bureau of Investigation (FBI) has issued an advisory, warning the public about the BADBOX 2.0 botnet, which is on a rampage compromising IoT devices in residential properties. 

    Devices like digital projectors, TV streaming devices, digital picture frames, and vehicle infotainment systems (most of which come from China) are most vulnerable to this attack.

    There are two ways your devices can be infected:

    • They could come pre-installed with the malicious software. 
    • Or you may unwittingly infect them yourself by downloading unrecognized and unverified software from compromised app marketplaces.

    When the HUMAN Security’s Satori Threat Intelligence team sourced devices from retailers for research, around 80% were found to be pre-infected with BADBOX (during the initial attack campaign).

    This particular bad actor seems to be one step ahead of the original BADBOX campaign, which was successfully neutralized in 2024. The earlier version of this cyberattack only involved devices that came pre-installed with these malicious backdoors. However, threat actors can now infect devices through authorized app downloads as well.

    Once the device is compromised, it’s added to the large botnet of infected devices, each of which acts as a proxy node. Threat actors and cybercriminals then use these compromised devices for illegal activities (like ad fraud, remote code installation, and creating fake email accounts).

    Criminals route traffic through these compromised devices to hide their original IP addresses and locations. The worst thing is that all of this happens without your knowledge. In the process, threat actors can also access your internet data and private information from the compromised home network.

    Brief History of BADBOX and PEACHPIT

    The original BADBOX campaign was detected as early as 2016. It relied heavily on the Trada malware, which has Chinese origins. HUMAN Security’s team found that as many as 74,000 Android devices were infected with BADBOX in that period.

    These devices had pre-installed embedded backdoors, which were set up to communicate with command and control (C2) servers monitored by the hackers.

    The primary purpose of these backdoors was to run widespread ad fraud on compromised devices. A key component of the initial BADBOX campaign was the PEACHPIT ad fraud module, with the primary aim of generating illicit ad revenue for attackers.

    The PEACHPIT module was downloaded into BADBOX-compromised devices and controlled through C2 servers. The PEACHPIT model infected as many as 280,000 devices, sending a massive 9B fraud requests every day.

    However, this doesn’t mean that devices not infected by BADBOX were safe. PEACHPIT also contained 39 malicious applications, which were downloaded around 15M times in 227 countries, which included iOS devices as well. During peak infection, these apps sent around 4B ad requests every day.

    As per HUMAN Security’s findings, the BADBOX backdoor didn’t affect iOS devices; instead, only the PEACHPIT apps available for download from many major app marketplaces impacted them.

    However, the ad fraud with BADBOX 2.0 is far more sophisticated than its predecessor.

    Malicious parties are resorting to hidden web view ad fraud, which loads advertisements in invisible web view components. The user is completely unaware of this until it’s too late because the adds are often placed off-screen or behind other elements. 

    Another method includes click fraud, where the hackers trick users into clicking on hidden ads or advertisements through automated scripts.

    Extent of the BADBOX 2.0 Damage

    HUMAN’s team has found more than 1M devices infected with BADBOX 2.0 so far, which is significantly more than the 74K infected during the first campaign. Besides the extensive app marketplace and ad frauds, attackers have also built an ‘entire fraudulent ecosystem’ of 200 backdoors, significantly expanding the attack area compared to its predecessor.

    In addition to ad fraud and proxyjacking, the compromised devices can also steal Personally Identifiable Information (PII), including OTPs, through keylogging and phishing attacks.

    Surprisingly, threat actors can use compromised devices to create fake Gmail and WhatsApp accounts by stealing these OTPs.

    They can then create new fake apps and stage cybercrimes that would trace back to the owner of the device (covering their tracks). They can also sign up for limited-access WhatsApp channels (likely to steal confidential info).

    Needless to say, attackers can send C2 commands for complete account takeovers and use the devices for Distributed Denial-of-Service (DDoS) attacks and distribute other malware.

    As you can see, the extent of BADBOX’s current version is significantly more than just an ad fraud tool – cybercriminals have designed the BADBOX 2.0 as a vehicle for widespread illicit monetization by hook or by crook.

    How to Identify and Protect Against BADBOX 2.0?

    Here are three ways you can keep yourself protected against the cybercriminals’ latest weapon.

    1. Only Buy from Reputable Providers

    Most of the compromised devices come from China and go for sale under unknown or anonymous brand names. For instance, most cases of BADBOX 2.0 are seen on the ‘TV98’ and ‘X96’ brands of these Android devices.

    A major reason behind choosing these devices is because they’re subject to looser security measures during production. This makes them more vulnerable to BADBOX-type attacks.

    So, a good rule of thumb is to buy devices only from reputable brands that you know and trust. A bit of online research, including skimming through YouTube reviews, can save you a massive headache later.

    2. Do NOT Disable Google Play Protect

    When installing new software for your IoT devices, never (and I do mean ‘never’) disable Play Protect. That’s one of the biggest red flags you can get.

    Play Protect scans apps on your phone for malicious behavior and warns you if any suspicious installation takes place. It also works for side-loading, i.e., installing apps outside of the Google Play Store.

    Source – Android Developers

    Disabling Play Protect makes it extremely difficult to track rootkits, backdoors, and keyloggers, which is exactly what threat actors need to infiltrate your device. So, the only plausible reason your device might be asking you to disable Play Protect is that it wants to install malicious software. 

    Next, if you notice the device downloading apps from unrecognized app marketplaces, it’s best to stop the installation immediately.

    Unlike the Google Play Store, other marketplaces may not implement the best security practices or vet and authorize each app. And you also run the risk of accessing a fake marketplace built specially designed by the hackers to trick you into installing malware.

    3. Check Network Traffic

    If you think hackers might have infiltrated, don’t worry. There’s a way you can get to the bottom of this by checking your device’s network traffic.

    Use a free network scanner app (like this one), which will scan your local network and list all connected devices. This will allow you to identify any unknown devices and make sure no one;’s watching from the shadows.

    Additionally, you can check your device’s bandwidth usage and connection history to recognize unusual patterns, such as increased traffic during odd hours.

    BADBOX 2.0, A Bigger Issue than It Seems

    The BADBOX 2.0 campaign isn’t just the work of a single organization but a collaborative effort of at least four major cybercriminal groups.

    • The SalesTracker Group is primarily responsible for managing C2 servers and infrastructures. 
    • The MoYu Group is the one that developed sophisticated backdoors used in these attacks. 
    • The Lemon group monetizes compromised devices through ad fraud and proxy services. 
    • Lastly, LongTV-backed applications were the ones found hidden in the ad fraud campaigns.

    We also believe the FBI hasn’t emphasized nearly enough the fact that the devices come pre-configured with malware before they reach the consumers (that being you). This makes it more than just a cybersecurity issue; it’s a breach of the supply chain integrity.

    In addition to raising eyebrows about security of low-cost IoT devices, it also fuels speculation that all of this could be state-backed.

    Something else to think about is that once the hackers compromise the devices, they sell them on the dark web as residential IPs. This means that many US households are becoming launchpads and hideouts for cybercriminals to carry out more sophisticated attacks. 

    All in all, the issue is certainly deeper (and scarier) than at first glance. If researchers don’t find a fix for BADBOX, millions of innocent, non-tech-savvy Americans will remain at risk.

    While the FBI is currently downplaying the situation, we wait for a permanent resolution or disruption of the entire BADBOX 2.0 operation.

    Krishi is a seasoned tech journalist with over four years of experience writing about PC hardware, consumer technology, and artificial intelligence.  Clarity and accessibility are at the core of Krishi’s writing style.
    He believes technology writing should empower readers—not confuse them—and he’s committed to ensuring his content is always easy to understand without sacrificing accuracy or depth.
    Over the years, Krishi has contributed to some of the most reputable names in the industry, including Techopedia, TechRadar, and Tom’s Guide. A man of many talents, Krishi has also proven his mettle as a crypto writer, tackling complex topics with both ease and zeal. His work spans various formats—from in-depth explainers and news coverage to feature pieces and buying guides. 
    Behind the scenes, Krishi operates from a dual-monitor setup (including a 29-inch LG UltraWide) that’s always buzzing with news feeds, technical documentation, and research notes, as well as the occasional gaming sessions that keep him fresh. 
    Krishi thrives on staying current, always ready to dive into the latest announcements, industry shifts, and their far-reaching impacts.  When he’s not deep into research on the latest PC hardware news, Krishi would love to chat with you about day trading and the financial markets—oh! And cricket, as well.


    View all articles by Krishi Chowdhary

    The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleFirefox OS’s story from a Mozilla insider not working on the project (2024)
    Next Article Logitech unveils Flip Folio case and keyboard for iPad Pro and iPad Air
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Newegg’s Ryzen 7 9850X3D combo bundle offers over $500 in savings on three key components, including 64GB DDR5 RAM

    February 25, 2026

    Tenku Pocket 8 micro laptop launched with 8-inch touch display and 8-core Intel Alder Lake-N CPU

    February 25, 2026

    Endorfy Signum M30 Air and M30 ARGB arrive as brand-new micro ATX PC towers

    February 25, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025693 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025279 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025160 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025122 Views
    Don't Miss
    Technology February 25, 2026

    Newegg’s Ryzen 7 9850X3D combo bundle offers over $500 in savings on three key components, including 64GB DDR5 RAM

    Newegg’s Ryzen 7 9850X3D combo bundle offers over $500 in savings on three key components,…

    Tenku Pocket 8 micro laptop launched with 8-inch touch display and 8-core Intel Alder Lake-N CPU

    Endorfy Signum M30 Air and M30 ARGB arrive as brand-new micro ATX PC towers

    Samsung Galaxy S26 series go official, 512GB base storage for Malaysia, from RM5199

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Newegg’s Ryzen 7 9850X3D combo bundle offers over $500 in savings on three key components, including 64GB DDR5 RAM

    February 25, 20262 Views

    Tenku Pocket 8 micro laptop launched with 8-inch touch display and 8-core Intel Alder Lake-N CPU

    February 25, 20262 Views

    Endorfy Signum M30 Air and M30 ARGB arrive as brand-new micro ATX PC towers

    February 25, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.