{"id":29646,"date":"2025-07-23T07:22:06","date_gmt":"2025-07-23T11:22:06","guid":{"rendered":"https:\/\/worldjusticenews.com\/news\/?p=29646"},"modified":"2025-07-23T07:22:06","modified_gmt":"2025-07-23T11:22:06","slug":"google-sues-operators-of-a-botnet-that-compromised-10-million-android-set-top-box-devices","status":"publish","type":"post","link":"https:\/\/worldjusticenews.com\/news\/2025\/07\/23\/google-sues-operators-of-a-botnet-that-compromised-10-million-android-set-top-box-devices\/","title":{"rendered":"Google Sues Operators of a Botnet that compromised 10 million Android Set-Top Box devices"},"content":{"rendered":"<p>A Google lawsuit filed in a New York court has been partly unsealed, revealing details of what is believed to be the largest botnet of its type in history. Consisting of 10 million compromised Android devices, mostly cheap Chinese set-top boxes popular with users of free and pirate streaming services, the Badbox 2.0 botnet turns user devices into nodes in a massive residential proxy network. Google says the botnet is used for ad fraud, malware distribution, and other digital crimes.<\/p>\n<p>In 2023, Google and its cybersecurity partners teamed up with German law enforcement agencies after\u00a0<a href=\"https:\/\/www.humansecurity.com\/company\/satori-threat-intelligence\/badbox\/\" target=\"_blank\" rel=\"noopener\">discovering BadBox<\/a>, a botnet comprised of 74,000 Android devices infected with malware.<\/p>\n<p>After deploying a range of measures to suppress BadBox, a much larger threat quickly arrived.<\/p>\n<h2>BadBox 2.0<\/h2>\n<p>BadBox 2.0 was discovered by HUMAN\u2019s Satori Threat Intelligence and Research team. Their\u00a0<a href=\"https:\/\/www.humansecurity.com\/company\/satori-threat-intelligence\/badbox-2-0\/\" target=\"_blank\" rel=\"noopener\">initial report<\/a>\u00a0published in March revealed how infected devices were able to request and click on ads without the user being aware, committing ad fraud and laundering.<\/p>\n<p>As part of a botnet able to act as a residential proxy network, devices were also being used for account takeovers, DDoS attacks, and spreading malware. Since infected devices are also capable of executing new code delivered over the internet, without any user interaction, the potential for harm was unusually high.<\/p>\n<p>&nbsp;<\/p>\n<p><center><em>One million infected devices\u2026<\/em><picture class=\"aligncenter size-full wp-image-269955\"><source srcset=\"https:\/\/torrentfreak.com\/images\/human-badbox2.png.webp 845w, https:\/\/torrentfreak.com\/images\/human-badbox2-300x175.png.webp 300w\" type=\"image\/webp\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" \/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/torrentfreak.com\/images\/human-badbox2.png\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" srcset=\"https:\/\/torrentfreak.com\/images\/human-badbox2.png 845w, https:\/\/torrentfreak.com\/images\/human-badbox2-300x175.png 300w, https:\/\/torrentfreak.com\/images\/human-badbox2-600x351.png 600w, https:\/\/torrentfreak.com\/images\/human-badbox2-150x88.png 150w, https:\/\/torrentfreak.com\/images\/human-badbox2-220x130.png 220w\" alt=\"human-badbox2\" width=\"670\" height=\"392\" \/><\/picture><\/center>&nbsp;<\/p>\n<p>At the time the impact of BadBox 2.0 was described as global, with more than one million devices infected in 222 countries and territories. To prevent the spread, users were advised to only download apps from official marketplaces such as Google Play while avoiding off-brand devices.<\/p>\n<p>A list of device model numbers made available since reveals that cheap set-top boxes manufactured in China appear to account for the majority of infected devices. However, laptop and desktop computers, smartphones, tablets, in-car entertainment devices and digital projectors have all been compromised too.<\/p>\n<p>&nbsp;<\/p>\n<p><center><picture class=\"aligncenter size-full wp-image-269946\"><source srcset=\"https:\/\/torrentfreak.com\/images\/badboxes-select-fs.png.webp 925w, https:\/\/torrentfreak.com\/images\/badboxes-select-fs-300x202.png.webp 300w\" type=\"image\/webp\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" \/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/torrentfreak.com\/images\/badboxes-select-fs.png\" sizes=\"auto, (max-width: 670px) 100vw, 670px\" srcset=\"https:\/\/torrentfreak.com\/images\/badboxes-select-fs.png 925w, https:\/\/torrentfreak.com\/images\/badboxes-select-fs-300x202.png 300w, https:\/\/torrentfreak.com\/images\/badboxes-select-fs-600x403.png 600w, https:\/\/torrentfreak.com\/images\/badboxes-select-fs-150x101.png 150w\" alt=\"badboxes\" width=\"670\" height=\"451\" \/><\/picture><\/center>&nbsp;<\/p>\n<p>In an\u00a0<a href=\"https:\/\/blog.google\/technology\/safety-security\/google-taking-legal-action-against-the-badbox-20-botnet\/\" target=\"_blank\" rel=\"noopener\">announcement<\/a> Google revealed that in partnership with HUMAN Security and Trend Micro, its researchers are now battling a botnet comprised of 10 million uncertified and infected devices, running Android\u2019s open-source software (Android Open Source Project), \u201cwhich lacks Google\u2019s security protections.\u201d<\/p>\n<h2>Lawsuit Filed in New York<\/h2>\n<p>Google\u2019s actions include a lawsuit filed at a federal court in New York which began in May but with most documents sealed until recently. In addition to a temporary restraining order issued on May 30, on July 1 Google was awarded a preliminary injunction to mitigate the ongoing spread of malware, infection of new devices, and other \u201ccriminal schemes\u201d.<\/p>\n<p>The identities of the defendants \u2013 Does 1-25 \u2013 are reportedly unknown but with some confidence Google\u2019s recently unsealed complaint places the blame firmly on bad actors in China who it believes would not comply with a judgment for money damages.<\/p>\n<p>\u2022\u00a0<em><strong>The Infrastructure Group:<\/strong>\u00a0Established and manages the \u201ccommand-and-control\u201d C2 infrastructure (C2 Servers and domains) for BadBox 2.0.<\/em><br \/>\n\u2022\u00a0<em><strong>The Backdoor Malware Group:<\/strong>\u00a0Developed and preinstalls malware on the infected devices and uses that malware to operate a botnet composed of a subset of BadBox 2.0-infected devices to carry out a variety of ad fraud campaigns.<\/em><br \/>\n\u2022\u00a0<em><strong>The Evil Twin Group<\/strong>: Develops apps that the BadBox 2.0 Enterprise uses to commit ad fraud via hidden ads.<\/em><br \/>\n\u2022\u00a0<em><strong>The Ad Games Group:<\/strong>\u00a0Connected to an ad fraud campaign conducted through BadBox 2.0-infected devices that uses fraudulent \u201cgames\u201d to generate ads in hidden web browsers<\/em><\/p>\n<h2>Google Obtains Permission to Take Significant Action<\/h2>\n<p>Specific details are currently withheld, but it appears that Google has been granted broad permission based on claims under the Computer Fraud and Abuse Act (CFAA) and the Corrupt Organizations Act (RICO), to block (and require other entities to block) traffic to and\/or from IP addresses and certain domains.<\/p>\n<p>Other reasonable measures, including seizing control of domain names through registrars and registries, are also at Google\u2019s disposal, to limit the botnet\u2019s ability to operate.<\/p>\n<p>&nbsp;<\/p>\n<p><center><em>Blocking Measures on Steroids<\/em><picture class=\"aligncenter size-full wp-image-269963\"><source srcset=\"https:\/\/torrentfreak.com\/images\/blocking-measures.png.webp 646w, https:\/\/torrentfreak.com\/images\/blocking-measures-300x340.png.webp 300w\" type=\"image\/webp\" sizes=\"auto, (max-width: 646px) 100vw, 646px\" \/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/torrentfreak.com\/images\/blocking-measures.png\" sizes=\"auto, (max-width: 646px) 100vw, 646px\" srcset=\"https:\/\/torrentfreak.com\/images\/blocking-measures.png 646w, https:\/\/torrentfreak.com\/images\/blocking-measures-300x340.png 300w, https:\/\/torrentfreak.com\/images\/blocking-measures-600x680.png 600w, https:\/\/torrentfreak.com\/images\/blocking-measures-132x150.png 132w\" alt=\"blocking measures\" width=\"646\" height=\"732\" \/><\/picture><\/center>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.ic3.gov\/PSA\/2025\/PSA250605#fn2\" target=\"_blank\" rel=\"noopener\">The FBI\u2019s advice<\/a>\u00a0is for users to \u201cavoid downloading apps from unofficial marketplaces advertising free streaming content\u201d and \u201cassess all IoT devices connected to home networks for suspicious activity.\u201d<\/p>\n<p>While avoiding unofficial marketplaces is straightforward, those looking for the latest movies and TV shows are unlikely to find suitable apps offering that content for free anywhere else. Monitoring home networks is likely to prove prohibitively difficult too.<\/p>\n<p>There may be a very good argument for physically destroying these devices. The complaint states that the entire supply chain is compromised. \u201cThey are devices\u00a0<em>manufactured<\/em>\u00a0by the BadBox 2.0 Enterprise,\u201d it reads.<\/p>\n<p>But even if malware isn\u2019t preinstalled, it can be installed remotely when devices are switched on by the user or when users download apps designed to look attractive but carry a similarly malicious payload.<\/p>\n<p><em>The preliminary injunction obtained by Google is available\u00a0<a href=\"https:\/\/torrentfreak.com\/images\/1-25-cv-04503-JPO-Google-v-Does-1-25-Badbox-2-Prelim-Injunc-250701.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>\u00a0(pdf)<\/em><\/p>\n<p>Source: \u00a0<a href=\"http:\/\/worldjusticenews.com\/news\/wp-content\/uploads\/2016\/11\/torrentfreak.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/worldjusticenews.com\/news\/wp-content\/uploads\/2016\/11\/torrentfreak.png\" alt=\"TorrentFreak\" width=\"38\" height=\"38\" \/><\/a> <a href=\"https:\/\/torrentfreak.com\/google-sues-operators-of-a-10-million-device-android-set-top-box-botnet-250721\/\" target=\"_blank\" rel=\"noopener\">TorrentFreak.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\">A Google lawsuit filed in a New York court has been partly unsealed, revealing details of what is believed to be the largest botnet of its type in history. Consisting of 10 million compromised Android <a class=\"mh-excerpt-more\" href=\"https:\/\/worldjusticenews.com\/news\/2025\/07\/23\/google-sues-operators-of-a-botnet-that-compromised-10-million-android-set-top-box-devices\/\" title=\"Google Sues Operators of a Botnet that compromised 10 million Android Set-Top Box devices\">[&#8230;]<\/a><\/div>\n","protected":false},"author":1,"featured_media":29647,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","footnotes":""},"categories":[109,2,3],"tags":[2938,11488,4536,11489,1673,8239,11490,7120,1011,11487,1172,305,2132,9402,9662,11491],"class_list":{"0":"post-29646","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-headline","8":"category-news","9":"category-usa","10":"tag-android","11":"tag-badbox","12":"tag-botnet","13":"tag-cfaa","14":"tag-china","15":"tag-computer-fraud-and-abuse-act","16":"tag-corrupt-organizations-act","17":"tag-cyber-security","18":"tag-ddos","19":"tag-digital-crime","20":"tag-fbi","21":"tag-fraud","22":"tag-malware","23":"tag-new-york-federal-court","24":"tag-rico","25":"tag-us-district-court-for-the-southern-district-of-new-york","26":"pmpro-has-access"},"_links":{"self":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/29646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/comments?post=29646"}],"version-history":[{"count":1,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/29646\/revisions"}],"predecessor-version":[{"id":29648,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/posts\/29646\/revisions\/29648"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/media\/29647"}],"wp:attachment":[{"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/media?parent=29646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/categories?post=29646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/worldjusticenews.com\/news\/wp-json\/wp\/v2\/tags?post=29646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}