Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

Posted on July 18, 2025July 18, 2025 By CWS

Jul 18, 2025Ravie LakshmananBotnet / Community Safety

Google on Thursday revealed it is pursuing authorized motion in New York federal court docket in opposition to 25 unnamed people or entities in China for allegedly working BADBOX 2.0 botnet and residential proxy infrastructure.
“The BADBOX 2.0 botnet compromised over 10 million uncertified gadgets working Android’s open-source software program (Android Open Supply Mission), which lacks Google’s safety protections,” the tech big stated.
“Cybercriminals contaminated these gadgets with pre-installed malware and exploited them to conduct large-scale advert fraud and different digital crimes.”
The corporate stated it instantly took steps to replace Google Play Defend, a malware and undesirable software program safety mechanism constructed into Android, to robotically thwart BADBOX-related apps.
The event comes a little bit over a month after the U.S. Federal Bureau of Investigation (FBI) issued a warning concerning the BADBOX 2.0 botnet.

BADBOX, first detected in late 2022, is thought to unfold through web of issues (IoT) gadgets corresponding to TV streaming gadgets, digital projectors, aftermarket automobile infotainment techniques, digital image frames and different merchandise, most of that are manufactured in China.
“Cybercriminals acquire unauthorized entry to dwelling networks by both configuring the product with malicious software program previous to the customers buy or infecting the system because it downloads required functions that include backdoors, often in the course of the set-up course of,” the FBI warned.
In an evaluation printed earlier this March, HUMAN Safety described the menace as the biggest botnet of contaminated related TV (CTV) gadgets ever uncovered so far. The overwhelming majority of BADBOX infections have been reported in Brazil, the USA, Mexico , and Argentina.
Whereas early iterations of the malware had been propagated through provide chain compromises that backdoored the IoT gadgets with malware prior to buy, the assault chains have since tailored to permit infections to unfold through malicious apps downloaded from unofficial marketplaces.
Greater than 10 million gadgets are estimated to have been roped into the botnet, permitting its operators to promote entry to compromised dwelling networks to facilitate numerous sorts of illicit exercise by different menace actors.
In a grievance filed on July 11, 2025, Google alleged that the BADBOX enterprise contains a number of teams, every of that are answerable for completely different features of the legal infrastructure –

The Infrastructure Group, which established and manages BADBOX 2.0’s main command-and-control (C2) infrastructure
The Backdoor Malware Group, which develops and pre-installs backdoor malware within the bots
The Evil Twin Group, that are behind an advert fraud marketing campaign that creates “evil twin” variations of respectable apps out there on Google Play Retailer to serve adverts and launch hidden internet browsers that load hidden adverts
The Advert Video games Group, which makes use of fraudulent “video games” to generate adverts

The corporate additionally accused BADBOX 2.0 actors of making writer accounts on the Google Advert Community to supply advert house on their apps or web sites, for which they’re compensated by Google.
“The only function of the Enterprise’s apps and web sites is to offer advert house for BADBOX 2.0 bots to generate visitors,” Google stated. “The Enterprise will deploy BADBOX 2.0 bots to ‘view’ these adverts, producing quite a few impressions of the advert. Google pays the BADBOX 2.0 Enterprise […] for these impressions.”

Moreover, Google identified the unlawful operation permits the menace actors to revenue from advert fraud on its community in three alternative ways: Utilizing seemingly respectable apps to stealthily load hidden adverts through the “evil twin” scheme, opening hidden internet browsers and interacting with adverts on recreation web sites created by them, and leveraging contaminated gadgets to conduct click on fraud.
“The court docket has issued a preliminary injunction, i.e. has mandated that the BADBOX 2.0 Enterprise instantly cease their botnet operations and related legal schemes globally, and has compelled third-party web service suppliers and area registries to actively help in dismantling the botnet’s infrastructure, as an example, by blocking visitors to and from specified domains,” Google stated.
In an announcement shared with The Hacker Information, Stu Solomon, CEO of HUMAN Safety, welcomed Google’s motion in opposition to the menace actors behind BADBOX 2.0, stating the trouble exemplifies the ability of collaborating in opposition to such threats.
“This takedown marks a major step ahead within the ongoing battle to safe the web from refined fraud operations that hijack gadgets, steal cash, and exploit customers with out their data,” Solomon added.

The Hacker News Tags:10M, Affecting, Android, BadBox, Botnet, Chinese, Devices, Entities, Google, Sues

Post navigation

Previous Post: Fraud: A Growth Industry Powered by Gen-AI
Next Post: 1.4 Million Affected by Data Breach at Virginia Radiology Practice

Related Posts

Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms The Hacker News
SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root The Hacker News
New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status The Hacker News
FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware The Hacker News
AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar The Hacker News
Critical RCE Bug Rated 9.9 CVSS in Backup & Replication The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools
  • In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass
  • Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon
  • Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution
  • Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools
  • In Other News: Law Firm Hacked by China, Symantec Flaw, Meta AI Hack, FIDO Key Bypass
  • Threat Actors Exploiting Ivanti Connect Secure Vulnerabilities to Deploy Cobalt Strike Beacon
  • Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution
  • Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News