Description

Germany's Federal Office of Information Security (BSI) disrupted a malware operation known as BADBOX, which came pre-installed on at least 30,000 internet-connected devices sold within the country. These devices, including digital picture frames, media players, and low-cost Android devices, were found to have outdated Android versions and embedded malware upon delivery. By sinkholing the command-and-control (C2) domains, the BSI severed communication between the infected devices and their operators, significantly mitigating the threat. Users were advised to disconnect these devices from the internet immediately. The BADBOX malware, first identified in 2023 by HUMAN's Satori Threat Intelligence team, utilized the Triada Android malware to target supply chain vulnerabilities. This malware enabled data theft, installation of additional malicious payloads, and the operation of a fraudulent ad botnet named PEACHPIT. PEACHPIT spoofed legitimate apps to generate fake ad impressions, exploiting infected devices for programmatic advertising fraud. Additionally, BADBOX devices were leveraged as residential proxies, enabling threat actors to route traffic and create online accounts while evading detection. The operation is suspected to have been orchestrated by actors based in China. The BSI's sinkholing operation redirected BADBOX device traffic, involving internet providers with over 100,000 subscribers to enforce the redirection. This initiative highlighted the risks of unvetted supply chains and cheap off-brand devices in enabling sophisticated cyberattacks. The incident underscores the need for consumers to vet purchases and for manufacturers to address supply chain vulnerabilities to prevent preloaded malware infections on devices.