A New Wave in Ad Fraud and Botnet Attacks
Overview
A new version of a major ad fraud and residential proxy scheme, known as BADBOX 2.0, has emerged, involving at least four different cybercrime groups. This operation has been described as the largest botnet ever found among connected TV devices and similar gadgets. The scheme infects low-cost consumer devices, turning them into parts of a vast network used to commit various online frauds.
You might be intertested in: Your Router Might Be Infected by Ballista Botnet
The Cybercrime Groups Behind the Attack
Four main groups are involved in this operation:
These groups work together, sharing control servers and maintaining business connections to support the overall operation.
How the Infection Spreads
BADBOX 2.0 starts with a hidden backdoor installed on affordable devices like Android tablets, CTV boxes, digital projectors, and car infotainment systems. This backdoor is delivered in three ways:
Once the backdoor is active, it allows attackers to load additional fraud tools and control the device remotely.
What the Botnet Does
Once a device is infected, it joins a botnet used for various illegal activities, such as:
It is estimated that up to one million devices are compromised, with most of the infections reported in Brazil, the United States, Mexico, and Argentina.
Steps Taken to Disrupt the Operation
Several measures have been taken to slow down BADBOX 2.0:
Additional Insights
The backdoor in BADBOX 2.0, known as BB2DOOR, shows similarities with another malware called Vo1d, which targets off-brand Android TV boxes. This new version of the operation uses updated methods to hide within legitimate apps and even modifies genuine Android libraries to stay active on the device.
This development comes on the heels of other ad fraud schemes, such as the Vapor campaign—which led to the removal of over 180 Android apps with millions of downloads—and a new effort that tricks users into downloading an Android banking malware called Octo through fake decoy sites.
Final Thoughts
BADBOX 2.0 highlights how cybercrime groups can work together and use common tools to create large-scale networks of compromised devices. By infecting everyday gadgets with hidden malware, these groups are able to carry out a variety of online frauds and attacks, showing the ongoing challenges in the fight against cybercrime.