Germany Neutralizes BADBOX Malware on 30,000 Devices with Sinkhole Strategy

Published:

spot_img

Major Malware Operation Disrupted: Germany’s BSI Takes Down BADBOX Threat Affecting 30,000 Devices

Germany Disrupts BADBOX Malware Operation Affecting 30,000 Devices

December 14, 2024 – The Federal Office of Information Security (BSI) in Germany has successfully disrupted a significant malware operation known as BADBOX, which had infiltrated at least 30,000 internet-connected devices nationwide. Authorities announced the operation’s thwarting earlier this week, detailing how the malware was preloaded on various gadgets, including digital picture frames, media players, and even smartphones.

In a proactive move, the BSI severed communications between these compromised devices and their command-and-control (C2) servers by utilizing a method called "sinkholing" to redirect harmful traffic. The BSI noted that all affected devices were operating on outdated versions of Android, making them particularly vulnerable to exploitation.

The BADBOX malware was first uncovered by HUMAN’s Satori Threat Intelligence team in October 2023. It exploits weak links in the supply chain of low-cost, off-brand Android devices. Once online, the malware could harvest sensitive information, including authentication codes, and install additional malicious software.

Adding a layer of complexity, BADBOX is connected to an ad fraud scheme known as PEACHPIT, which creates fake ad impressions through spoofed applications. This operation, reportedly based in China, profits from selling these fraudulent impressions via programmatic advertising.

The BSI has urged internet service providers with over 100,000 subscribers to redirect traffic from these devices to the sinkhole and is advising consumers to disconnect any affected products from the internet immediately. As the threat landscape continues to evolve, this incident highlights the urgent need for consumers to remain vigilant about the devices they purchase and connect to their networks.

spot_img

Related articles

Recent articles

Tailored Tech Support Scams Launch Customized Havoc on Organizations

Growing Cyber Threats: Fake IT Support and the Havoc C2 Framework Emerging Threats in Cybersecurity Recent investigations by threat hunters have unveiled a concerning trend: cybercriminals...

ES-KO at 70: Celebrating Seven Decades of Excellence in Catering, Logistics, and Facility Management in Tough Environments

ES-KO: Celebrating 70 Years of Excellence in Catering and Facility Management ES-KO, a prominent player in the fields of catering, facility management, procurement, and...

Escalating Cyber Warfare: Iran, US, and Israel Clash on Military and Digital Battlegrounds

The Evolution of Warfare: Understanding the Hybrid Conflict in the Middle East Introduction to Hybrid Warfare In recent months, the Middle East has witnessed a significant...

70% of Online Fraud Linked to Fake Trading Apps; Maharashtra, UP, and Rajasthan Identify as Mule Account Hotspots

The Rise of Online Investment Scams in India A Shift in Cybercrime Tactics In recent times, the landscape of online fraud has dramatically changed, reflecting a...