Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    U.S. Army bringing in big tech executives as lieutenant colonels

    The Emperor’s New LLM

    How the Alzheimer’s Research Scandal Set Back Treatment 16 Years (2022)

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025

      AI poses a bigger threat to women’s work, than men’s, report says

      May 21, 2025

      AMD CEO Lisa Su calls China a ‘large opportunity’ and warns against strict U.S. chip controls

      May 8, 2025
    • Business

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025

      Cookie-Bite attack PoC uses Chrome extension to steal session tokens

      April 22, 2025
    • Crypto

      Another LastPass User Loses $200,000 in Crypto to Hackers

      June 13, 2025

      Stellar (XLM) Price Hits Monthly Low – What’s Next?

      June 13, 2025

      Crypto Founder Sentenced to 8 Months in Prison on Wash Trading Charges

      June 13, 2025

      3 Altcoins That Are Thriving Despite Today’s Brief Market Crash

      June 13, 2025

      Top Altcoins Trending in Nigeria as Traders Shift Beyond Bitcoin, Ethereum

      June 13, 2025
    • Technology

      U.S. Army bringing in big tech executives as lieutenant colonels

      June 14, 2025

      The Emperor’s New LLM

      June 14, 2025

      How the Alzheimer’s Research Scandal Set Back Treatment 16 Years (2022)

      June 14, 2025

      Implementing Logic Programming

      June 14, 2025

      MUMPS

      June 14, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»The FBI Warns of BADBOX 2.0 – A Cyberattack That Targets Home IoT Devices
    Technology

    The FBI Warns of BADBOX 2.0 – A Cyberattack That Targets Home IoT Devices

    TechAiVerseBy TechAiVerseJune 11, 2025No Comments9 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    The FBI Warns of BADBOX 2.0 – A Cyberattack That Targets Home IoT Devices
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    The FBI Warns of BADBOX 2.0 – A Cyberattack That Targets Home IoT Devices

    Key Takeaways

    • The FBI has warned users of BADBOX 2.0 – a malicious software that infects home devices like TVs, streaming devices, and vehicle infotainment systems.
    • Once compromised, these devices are added to the botnet network and used as proxies for malicious activities.
    • Users need to practice vigilance by avoiding purchases from unrecognized brands and checking network traffic for suspicious activity.

    The Federal Bureau of Investigation (FBI) has issued an advisory, warning the public about the BADBOX 2.0 botnet, which is on a rampage compromising IoT devices in residential properties. 

    Devices like digital projectors, TV streaming devices, digital picture frames, and vehicle infotainment systems (most of which come from China) are most vulnerable to this attack.

    There are two ways your devices can be infected:

    • They could come pre-installed with the malicious software. 
    • Or you may unwittingly infect them yourself by downloading unrecognized and unverified software from compromised app marketplaces.

    When the HUMAN Security’s Satori Threat Intelligence team sourced devices from retailers for research, around 80% were found to be pre-infected with BADBOX (during the initial attack campaign).

    This particular bad actor seems to be one step ahead of the original BADBOX campaign, which was successfully neutralized in 2024. The earlier version of this cyberattack only involved devices that came pre-installed with these malicious backdoors. However, threat actors can now infect devices through authorized app downloads as well.

    Once the device is compromised, it’s added to the large botnet of infected devices, each of which acts as a proxy node. Threat actors and cybercriminals then use these compromised devices for illegal activities (like ad fraud, remote code installation, and creating fake email accounts).

    Criminals route traffic through these compromised devices to hide their original IP addresses and locations. The worst thing is that all of this happens without your knowledge. In the process, threat actors can also access your internet data and private information from the compromised home network.

    Brief History of BADBOX and PEACHPIT

    The original BADBOX campaign was detected as early as 2016. It relied heavily on the Trada malware, which has Chinese origins. HUMAN Security’s team found that as many as 74,000 Android devices were infected with BADBOX in that period.

    These devices had pre-installed embedded backdoors, which were set up to communicate with command and control (C2) servers monitored by the hackers.

    The primary purpose of these backdoors was to run widespread ad fraud on compromised devices. A key component of the initial BADBOX campaign was the PEACHPIT ad fraud module, with the primary aim of generating illicit ad revenue for attackers.

    The PEACHPIT module was downloaded into BADBOX-compromised devices and controlled through C2 servers. The PEACHPIT model infected as many as 280,000 devices, sending a massive 9B fraud requests every day.

    However, this doesn’t mean that devices not infected by BADBOX were safe. PEACHPIT also contained 39 malicious applications, which were downloaded around 15M times in 227 countries, which included iOS devices as well. During peak infection, these apps sent around 4B ad requests every day.

    As per HUMAN Security’s findings, the BADBOX backdoor didn’t affect iOS devices; instead, only the PEACHPIT apps available for download from many major app marketplaces impacted them.

    However, the ad fraud with BADBOX 2.0 is far more sophisticated than its predecessor.

    Malicious parties are resorting to hidden web view ad fraud, which loads advertisements in invisible web view components. The user is completely unaware of this until it’s too late because the adds are often placed off-screen or behind other elements. 

    Another method includes click fraud, where the hackers trick users into clicking on hidden ads or advertisements through automated scripts.

    Extent of the BADBOX 2.0 Damage

    HUMAN’s team has found more than 1M devices infected with BADBOX 2.0 so far, which is significantly more than the 74K infected during the first campaign. Besides the extensive app marketplace and ad frauds, attackers have also built an ‘entire fraudulent ecosystem’ of 200 backdoors, significantly expanding the attack area compared to its predecessor.

    In addition to ad fraud and proxyjacking, the compromised devices can also steal Personally Identifiable Information (PII), including OTPs, through keylogging and phishing attacks.

    Surprisingly, threat actors can use compromised devices to create fake Gmail and WhatsApp accounts by stealing these OTPs.

    They can then create new fake apps and stage cybercrimes that would trace back to the owner of the device (covering their tracks). They can also sign up for limited-access WhatsApp channels (likely to steal confidential info).

    Needless to say, attackers can send C2 commands for complete account takeovers and use the devices for Distributed Denial-of-Service (DDoS) attacks and distribute other malware.

    As you can see, the extent of BADBOX’s current version is significantly more than just an ad fraud tool – cybercriminals have designed the BADBOX 2.0 as a vehicle for widespread illicit monetization by hook or by crook.

    How to Identify and Protect Against BADBOX 2.0?

    Here are three ways you can keep yourself protected against the cybercriminals’ latest weapon.

    1. Only Buy from Reputable Providers

    Most of the compromised devices come from China and go for sale under unknown or anonymous brand names. For instance, most cases of BADBOX 2.0 are seen on the ‘TV98’ and ‘X96’ brands of these Android devices.

    A major reason behind choosing these devices is because they’re subject to looser security measures during production. This makes them more vulnerable to BADBOX-type attacks.

    So, a good rule of thumb is to buy devices only from reputable brands that you know and trust. A bit of online research, including skimming through YouTube reviews, can save you a massive headache later.

    2. Do NOT Disable Google Play Protect

    When installing new software for your IoT devices, never (and I do mean ‘never’) disable Play Protect. That’s one of the biggest red flags you can get.

    Play Protect scans apps on your phone for malicious behavior and warns you if any suspicious installation takes place. It also works for side-loading, i.e., installing apps outside of the Google Play Store.

    Source – Android Developers

    Disabling Play Protect makes it extremely difficult to track rootkits, backdoors, and keyloggers, which is exactly what threat actors need to infiltrate your device. So, the only plausible reason your device might be asking you to disable Play Protect is that it wants to install malicious software. 

    Next, if you notice the device downloading apps from unrecognized app marketplaces, it’s best to stop the installation immediately.

    Unlike the Google Play Store, other marketplaces may not implement the best security practices or vet and authorize each app. And you also run the risk of accessing a fake marketplace built specially designed by the hackers to trick you into installing malware.

    3. Check Network Traffic

    If you think hackers might have infiltrated, don’t worry. There’s a way you can get to the bottom of this by checking your device’s network traffic.

    Use a free network scanner app (like this one), which will scan your local network and list all connected devices. This will allow you to identify any unknown devices and make sure no one;’s watching from the shadows.

    Additionally, you can check your device’s bandwidth usage and connection history to recognize unusual patterns, such as increased traffic during odd hours.

    BADBOX 2.0, A Bigger Issue than It Seems

    The BADBOX 2.0 campaign isn’t just the work of a single organization but a collaborative effort of at least four major cybercriminal groups.

    • The SalesTracker Group is primarily responsible for managing C2 servers and infrastructures. 
    • The MoYu Group is the one that developed sophisticated backdoors used in these attacks. 
    • The Lemon group monetizes compromised devices through ad fraud and proxy services. 
    • Lastly, LongTV-backed applications were the ones found hidden in the ad fraud campaigns.

    We also believe the FBI hasn’t emphasized nearly enough the fact that the devices come pre-configured with malware before they reach the consumers (that being you). This makes it more than just a cybersecurity issue; it’s a breach of the supply chain integrity.

    In addition to raising eyebrows about security of low-cost IoT devices, it also fuels speculation that all of this could be state-backed.

    Something else to think about is that once the hackers compromise the devices, they sell them on the dark web as residential IPs. This means that many US households are becoming launchpads and hideouts for cybercriminals to carry out more sophisticated attacks. 

    All in all, the issue is certainly deeper (and scarier) than at first glance. If researchers don’t find a fix for BADBOX, millions of innocent, non-tech-savvy Americans will remain at risk.

    While the FBI is currently downplaying the situation, we wait for a permanent resolution or disruption of the entire BADBOX 2.0 operation.

    Krishi is a seasoned tech journalist with over four years of experience writing about PC hardware, consumer technology, and artificial intelligence.  Clarity and accessibility are at the core of Krishi’s writing style.
    He believes technology writing should empower readers—not confuse them—and he’s committed to ensuring his content is always easy to understand without sacrificing accuracy or depth.
    Over the years, Krishi has contributed to some of the most reputable names in the industry, including Techopedia, TechRadar, and Tom’s Guide. A man of many talents, Krishi has also proven his mettle as a crypto writer, tackling complex topics with both ease and zeal. His work spans various formats—from in-depth explainers and news coverage to feature pieces and buying guides. 
    Behind the scenes, Krishi operates from a dual-monitor setup (including a 29-inch LG UltraWide) that’s always buzzing with news feeds, technical documentation, and research notes, as well as the occasional gaming sessions that keep him fresh. 
    Krishi thrives on staying current, always ready to dive into the latest announcements, industry shifts, and their far-reaching impacts.  When he’s not deep into research on the latest PC hardware news, Krishi would love to chat with you about day trading and the financial markets—oh! And cricket, as well.


    View all articles by Krishi Chowdhary

    The Tech Report editorial policy is centered on providing helpful, accurate content that offers real value to our readers. We only work with experienced writers who have specific knowledge in the topics they cover, including latest developments in technology, online privacy, cryptocurrencies, software, and more. Our editorial policy ensures that each topic is researched and curated by our in-house editors. We maintain rigorous journalistic standards, and every article is 100% written by real authors.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleFirefox OS’s story from a Mozilla insider not working on the project (2024)
    Next Article Logitech unveils Flip Folio case and keyboard for iPad Pro and iPad Air
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    U.S. Army bringing in big tech executives as lieutenant colonels

    June 14, 2025

    The Emperor’s New LLM

    June 14, 2025

    How the Alzheimer’s Research Scandal Set Back Treatment 16 Years (2022)

    June 14, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202523 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202518 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202514 Views

    Arizona moves to ban AI use in reviewing medical claims

    March 12, 202511 Views
    Don't Miss
    Technology June 14, 2025

    U.S. Army bringing in big tech executives as lieutenant colonels

    U.S. Army bringing in big tech executives as lieutenant colonels Andrew Bosworth, chief technology officer…

    The Emperor’s New LLM

    How the Alzheimer’s Research Scandal Set Back Treatment 16 Years (2022)

    Implementing Logic Programming

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    U.S. Army bringing in big tech executives as lieutenant colonels

    June 14, 20250 Views

    The Emperor’s New LLM

    June 14, 20250 Views

    How the Alzheimer’s Research Scandal Set Back Treatment 16 Years (2022)

    June 14, 20250 Views
    Most Popular

    Ethereum must hold $2,000 support or risk dropping to $1,850 – Here’s why

    March 12, 20250 Views

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.