Your browser is not Javascript enable or you have turn it off. We recommend you to activate for better security reasonNew variant of Badbox malware returns to infect Android Smart TVs - FlatpanelsHD

New variant of Badbox malware returns to infect Android Smart TVs

02 Jan 2025 | Rasmus Larsen |

The 'Badbox' malware is far from dead and has now been found to infect Android-based Smart TVs, alongside Android TV boxes, smartphones, car entertainment systems and more.

Last year, security researchers discovered that over 20 million Android-based TV boxes running open source Android were infected with the so-called Badbox malware.

Efforts have been made to dismantle the botnet. For example, the German government got involved to combat the Badbox malware pre-installed on 30,000 devices in Germany.


Badbox is back

Unfortunately, it remains a cat-and-mouse game as a new Badbox variant has been uncovered by security researchers at Bitsight. - "This botnet was presumed dead, after a push to stop its spread. However, not only is it still active, but it also appears to be larger and more versatile than previously anticipated," said Pedro Falé, Threat Researcher at Bitsight.

Infects Android-based Smart TVs

Expanding beyond Android TV boxes and mobile devices, the new Badbox malware now also targets Android-based Smart TVs. These are not the official Android TV or Google TV devices but rather devices built on open source Android (AOSP). - "First, the models ranging from YNDX-00091 to YNDX-000102 are 4K Smart TVs from a well-known brand, not cheap Android TV boxes. It’s the first time a major brand Smart TV is seen directly communicating at such volume with a BADBOX command and control (C2) domain, broadening the scope of affected devices beyond Android TV boxes, tablets, and smartphones," explained Pedro Falé. The countries most affected are Russia, China, India, Belarus, Brazil and Ukraine. Also read: 1.3 million Android-based TV boxes affected by new 'Vo1d' malware The new Badbox variant exploits devices for "residential proxying (using backdoored devices as exit points), remote code installation, account abuse, and ad fraud", according to the security researchers. The most concerning aspect is that new code can be remotely loaded onto devices without the user's knowledge. Further details are available in Bitsight's report here.

Google responds

Google has responded to the new findings saying that open source Android devices are not protected by its certification and security measures. - "These off-brand devices discovered to be infected were not Play Protect certified Android devices. If a device isn’t Play Protect certified, Google doesn’t have a record of security and compatibility test results. Play Protect certified Android devices undergo extensive testing to ensure quality and user safety. To help you confirm whether or not a device is built with Android TV OS and Play Protect certified, our Android TV website provides the most up-to-date list of partners. You can also take these steps to check if your device is Play Protect certified," a Google Spokesperson told Android Headlines. - Source: Bitsight via Android Headlines
Sign up for FlatpanelsHD's newsletter

The latest news, in-depth articles, reviews, and exclusives in your inbox.

Latest news
2025 OLED monitors
10 Feb 2025 | Rasmus Larsen |
Panasonic Fire TV
10 Feb 2025 | Rasmus Larsen |
Super Bowl 2025
07 Feb 2025 | Rasmus Larsen |
Super Bowl LIX
07 Feb 2025 | Rasmus Larsen |
Nvidia Shield 9.2
06 Feb 2025 | Rasmus Larsen |
Panasonic TV exit
05 Feb 2025 | Rasmus Larsen |
Panasonic Z95B OLED
05 Feb 2025 | Rasmus Larsen |
Sonos
05 Feb 2025 | Rasmus Larsen |