Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices

Google has filed a lawsuit in New York federal court against the operators of the BadBox 2.0 botnet, marking a significant escalation in the tech giant’s fight against cybercriminal networks.The malware campaign represents the largest known botnet of internet-connected television devices, compromising over 10 million uncertified [Android devices](https://cybersecuritynews.com/microsoft-bans-android-devices/) worldwide.BadBox 2.0 emerged as a sophisticated threat targeting devices running Android’s open-source software without Google’s integrated security protections.The malware operators exploited the vulnerability gap in uncertified devices, pre-installing malicious code that remained dormant until activation.This strategic approach allowed cybercriminals to establish persistent access to millions of connected TVs and [streaming devices](https://cybersecuritynews.com/40000-internet-connected-cameras-exposed/) across global networks.The botnet’s primary attack vector involved manufacturing partnerships with device producers who unknowingly distributed compromised hardware.Once deployed in consumer environments, the infected devices conducted large-scale ad fraud operations, generating illegitimate revenue streams while remaining largely undetected by users.Google researchers [identified](https://blog.google/technology/safety-security/google-taking-legal-action-against-the-badbox-20-botnet/) the malware’s sophisticated evasion techniques, which included mimicking legitimate network traffic patterns and operating during low-usage periods.Google analysts working alongside HUMAN Security and Trend Micro researchers noted the malware’s advanced persistence mechanisms during their investigation.The collaborative effort revealed BadBox 2.0’s ability to maintain command-and-control communications through encrypted channels, making traditional network monitoring ineffective.**Infection Mechanism and Persistence Architecture**—————————————————-The malware’s infection mechanism relies on firmware-level integration during the manufacturing process.BadBox 2.0 embeds itself within the Android Open Source Project framework, establishing deep system-level access that survives factory resets.The malware creates hidden service processes that communicate with remote servers, enabling operators to push additional payloads and update [attack strategies](https://cybersecuritynews.com/5-strategies-for-mitigating-the-impact-of-cybersecurity-attacks-on-public-services/) dynamically.Google’s Ad Traffic Quality team has since updated Google Play Protect to automatically identify and block BadBox-associated applications, while the FBI continues coordinating with international law enforcement agencies.**Boost detection, reduce alert fatigue, accelerate response; all with an interactive sandbox built for security teams –> [Try ANY.RUN Now](https://any.run/demo?utm_source=csn&utm_medium=article&utm_campaign=top3_ciso_challenges&utm_content=demo_1&utm_term=160725)**The post [Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices](https://cybersecuritynews.com/google-sued-badbox-2-0-malware-botnet-operators/) appeared first on [Cyber Security News](https://cybersecuritynews.com).

Related Tags:
Play

NAICS: 334 – Computer And Electronic Product Manufacturing

NAICS: 519 – Web Search Portals

Libraries

Archives

Other Information Services

NAICS: 518 – Computing Infrastructure Providers

Data Processing

Web Hosting

Related Services

NAICS: 33 – Manufacturing – Metal

Electronics And Other

NAICS: 516 – Broadcasting And Content Providers

NAICS: 51 – Information

Financial Theft

Blog: Cybersecurity News

Associated Indicators: