Global map showing BADBOX 2.0 malware infection rates by country, with Brazil and the United States leading.

FBI Warning: BADBOX 2.0 Malware Infects Over 1 Million IoT Devices

Introduction

The FBI has issued a critical warning about BADBOX 2.0, a malware campaign that has compromised over 1 million Internet-connected devices. This botnet transforms consumer-grade electronics into residential proxies used for criminal purposes, including ad fraud and credential stuffing. The majority of these infected devices originate from Chinese Android-based platforms such as smart TVs, streaming boxes, projectors, and tablets.

How BADBOX 2.0 Malware Works

Devices infected with BADBOX 2.0 often come with malware pre-installed or are compromised through firmware updates and malicious Android apps. These apps sometimes sneak past security checks on Google Play and third-party app stores. The malware grants attackers unauthorized access during the initial setup or app installation phase. Consequently, home networks become vulnerable to malicious use once these devices go online.

 

Malicious Capabilities of the BADBOX 2.0 Botnet

  • Residential Proxy Networks: It redirects cybercriminal traffic through victims’ IP addresses to hide malicious activities.
  • Ad Fraud: The malware loads and clicks on ads in the background, generating revenue for threat actors.
  • Credential Stuffing: By masking attacker IPs, it facilitates attempts to access accounts using stolen credentials.

Evolution and Global Reach of BADBOX 2.0

The original BADBOX malware surfaced in 2023, hidden in cheap Android TV boxes like the T95. Although Germany’s cybersecurity agency disrupted part of the botnet in 2024, the threat rapidly returned. Within a week, researchers identified 192,000 newly infected devices, including mainstream brands such as Yandex TVs and Hisense smartphones.

According to HUMAN’s Satori Threat Intelligence, BADBOX 2.0 is more pervasive than ever, infecting over 1 million devices by March 2025. These devices, built using the Android Open Source Project, are not Google Play Protect certified, making them more vulnerable to malware infiltration. HUMAN observed BADBOX 2.0 traffic in 222 countries and territories globally, with Brazil (37.6%), the United States (18.2%), Mexico (6.3%), and Argentina (5.3%) showing the highest infection rates.

Countermeasures and Ongoing Risk

Infected Device Models

The following Android-based devices are confirmed to be infected by the BADBOX 2.0 malware. Many are uncertified, low-cost imports often found on unofficial marketplaces:

 

Device Model Device Model Device Model Device Model
TV98 X96Q_Max_P Q96L2 X96Q2
X96mini S168 ums512_1h10_Natv X96_S400
X96mini_RP TX3mini HY-001 MX10PRO
X96mini_Plus1 LongTV_GN7501E Xtv77 NETBOX_B68
X96Q_PR01 AV-M9 ADT-3 OCBN
X96MATE_PLUS KM1 X96Q_PRO Projector_T6P
X96QPRO-TM sp7731e_1h10_native M8SPROW TV008
X96Mini_5G Q96MAX OrbsMart_TR43 Z6
TVBOX Smart KM9PRO A15
Transpeed KM7 iSinbox I96
SMART_TV Fujicom-SmartTV MXQ9PRO MBOX
X96Q iSinbox Mbox R11
GameBox KM6 X96Max_Plus2 TV007
Q9 Stick SP7731E H6 X88
X98K TXCZ

Despite a second disruption effort by HUMAN in collaboration with Google, Trend Micro, and The Shadowserver Foundation, BADBOX 2.0 continues to spread. Over 500,000 infected devices were blocked from communicating with command and control servers, yet new infections persist as compromised devices remain on the market.

How to Identify and Mitigate BADBOX 2.0

Common indicators of infection include:

  • Presence of unauthorized app marketplaces
  • Disabled Google Play Protect settings
  • TV boxes advertised for free or “unlocked” streaming
  • Devices from unknown or off-brand manufacturers
  • Unusual network traffic patterns

Most infected devices are uncertified and not protected by Google’s Play Protect program. As a result, users are highly encouraged to assess their home networks thoroughly.

FBI Recommendations to Protect Your Home Network

The FBI recommends several proactive measures to defend against BADBOX 2.0:

  • Audit all IoT devices for unusual activity
  • Avoid downloading apps from unofficial sources
  • Monitor network traffic continuously
  • Update all connected devices with the latest firmware
  • Isolate any suspicious device from your network immediately

Conclusion

BADBOX 2.0 represents a persistent and evolving threat that exploits consumer electronics for large-scale cybercriminal operations. Although security agencies and private-sector partners have successfully disrupted portions of the botnet, ongoing vigilance is essential. Consumers should verify the origin and security of IoT devices and remain cautious about software sources.

For a deeper defense-in-depth approach, check out our guide on setting up your own encrypted VPN server in 15 minutes, which can safeguard your network alongside measures to block malware like BADBOX 2.0 or read more on Trend Micro’s threat intelligence.

Leave a Reply