Third Party Risk Management,
Endpoint Security,
Governance & Risk Management
Off-Brand Android Devices Infected with Trojan Malware

Recent investigations have revealed a botnet that has compromised over 1 million off-brand Android devices, predominantly produced in China. These devices, which include a range of products from TV streaming boxes to aftermarket car infotainment systems, arrived in consumer hands with a pre-installed backdoor.
The state of asset security continues to raise alarms, particularly regarding low-cost Android devices manufactured in China. These devices have become known vectors for cybercriminal enterprises involved in diverse schemes, such as programmatic ad fraud and click fraud. They are frequently repurposed as residential proxies to obscure malicious internet activities.
In 2023, cybersecurity firm Human Security uncovered an operation named “Badbox” that specifically targets Android devices. This operation has recently resumed its activities, continuing to pose a serious threat even after a significant disruption by the German government which dismantled a large portion of Badbox’s infrastructure last December.
The majority of compromised devices are concentrated in South America, with Brazil being the most affected. Notably, these devices tend to be generic and off-brand, eschewing well-known manufacturers, which makes them particularly vulnerable to exploitation.
Badbox, now operating under the moniker Badbox 2.0, comprises various threat actors who specialize in different roles, sharing infrastructure and business connections. This multifaceted structure facilitates the rapid dissemination of malware through an infiltrated supply chain. In some cases, users have inadvertently downloaded malicious versions of popular applications, leading to more than 50,000 downloads of these harmful “evil twin” apps.
Additionally, Longvision Media, a Malaysia-based internet and media firm, has been linked to some infected devices, particularly its LongTV streaming models, which have been found to come pre-loaded with the backdoor. These devices utilize hidden web browsers to connect to sites hosting HTML5 games designed not for playability, but rather to serve pervasive advertisements, thus generating revenue for their operators without any actual user engagement.
The collaboration efforts between Human Security, Trend Micro, and Google, aided by the Shadowserver Foundation, aim to disrupt the operational capacity of Badbox 2.0 through tactics such as sinkholing internet traffic. However, researchers caution that these measures may not have completely halted the group’s operations.
The tactics employed in this cyber threat can be linked to various techniques outlined in the MITRE ATT&CK framework, particularly focusing on initial access methods and persistence mechanisms that facilitate continued exploitation of compromised devices. As the landscape of cyber threats evolves, it is imperative for business owners to remain vigilant and proactive in securing their networks against such sophisticated cybercrime initiatives.