www.bitsight.com Open in urlscan Pro
2606:4700:10::6816:4bf2  Public Scan

URL: https://www.bitsight.com/blog/badbox-botnet-back
Submission Tags: @nominet_threat_intel feedly-filtered-v1.0 reference_article_link confidence_null cluster_18645077 Search All
Submission: On December 18 via api from GB — Scanned from GB

Form analysis 0 forms found in the DOM

Text Content

This website is AudioEye enabled and is being optimized for accessibility. To
open the AudioEye Toolbar, press "shift + =". Some assistive technologies may
require the use of a passthrough function before this keystroke. For more
information, activate the button labeled “Explore your accessibility options”.

Skip to main content


UTILITY

 * Blog
 * Partners
 * Request Demo
 * Chat With Us
 * Login

See Your Rating
Show/Hide Main Menu
 * Products
   
    * Enterprise Security
       * Security Performance Management
       * External Attack Surface Management
       * Cybersecurity Analytics
       * Security Ratings
       * Cyber Threat Intelligence NEW
       * SPM Integrations
   
    * Digital Supply Chain
       * Third-Party Risk Management
       * Vendor Risk Management
       * Continuous Monitoring
       * Vulnerability Detection & Response
       * Trust Management Hub
       * TPRM Integrations
   
    * Cyber Governance & Reporting
       * Cybersecurity Ratings
       * Cybersecurity Regulations
       * Cyber Risk Quantification
   
    * Cybersecurity Data Feed
       * Cyber Data Solutions
   
    * Cyber Underwriting & Risk Control
       * Cyber Insurance
   
    * Professional Services
       * Service Offerings
   
   Free Attack Surface Report
   
   Your attack surface is expanding—know exactly how it looks. Our report gives
   you the insights you need to see your external attack surface.
   
   Receive custom report
 * Solutions
   
   See beyond borders
   
   Bitsight enables risk and security leaders to see beyond the firewall — to
   the vendors and partners, clouds and applications, patches and programs —
   that introduce risk in your digital ecosystem.
   
    * By Use Cases
       * Exposure Management
       * Third-Party Risk Management
       * Reporting and Compliance
       * Cybersecurity Regulations NEW
       * Continuous Monitoring
       * Executive Reporting
       * Supply Chain Visibility
       * Investment Management
       * National Cybersecurity
   
    * By Industry
       * Financial Services
       * Insurance Services
       * Healthcare
       * Government
       * Technology
       * Energy/Utilities
       * Retail
       * Manufacturing
       * Education
   
   Bitsight to Acquire Cyber Threat Intelligence Leader Cybersixgill to Help
   Enterprises to Preempt Cyber Attacks
   
   Read release
 * Why Bitsight
   
   Trust in our data
   
   We combine real-time discovery of networks, assets, and vulnerabilities with
   our AI attribution engine and over 100 security researchers to amass one of
   the largest and mapped risk datasets in the world.
   
    * Why Bitsight
       * Why Bitsight
       * Security Ratings Leader
       * * Trusted Ratings
       * Data & Insights
       * Data Correlation & Studies
       * Data Discovery
       * Data Mapping & Attribution NEW
       * Cyber Data for Capital Markets NEW
   
    * Bitsight TRACE
       * Latest Security Research
       * Meet the Team
   
   Bitsight delivered 297% ROI for security leaders
   
   Forrester Consulting's Total Economic Impact™ Of Bitsight study shows a near
   3x return on investment and material business outcomes for customers.
   
   Download Study
 * Company
   
   Building trust in the digital economy
   
   Bitsight is a cyber risk management leader transforming how companies manage
   exposure, performance, and risk for themselves and their third parties.
   
    * About Us
       * Our Story
       * Our Team
       * Trust Center
       * Moody's Partnership
       * Diversity & Inclusion
       * Press Releases
       * In the News
   
    * Connect with Us
       * Careers
       * * Open Positions
       * Events
       * Locations
       * Contact Us
   
   Bitsight to Acquire Cyber Threat Intelligence Leader Cybersixgill to Help
   Enterprises to Preempt Cyber Attacks
   
   Read release
 * Resources
   
   Did you know?
   
   More than 60% of Known Exploited Vulnerabilities remain unmitigated past
   deadlines and take, on average, 4.5 months to remediate.
   
   Source: Bitsight TRACE
   
    * Resources
       * Customer Stories
       * Reports & eBooks
       * Datasheets
       * Webinars
       * Videos
       * Cybersecurity Glossary
       * All Resources
   
    * Blog
       * Vulnerabilities & Incidents
       * Policy & Regulations
       * Exposure Management
       * Third-Party Risk Management
       * All Blog Posts
   
   Bitsight delivered 297% ROI for security leaders
   
   Read the study to see how bolstering your cyber security program with
   Bitsight can protect your business while improving your bottom line.
   
   Download Forrester Study

See Your Rating
 * Blog
 * Partners
 * Login
 * Chat With Us
 * Request Demo


BADBOX BOTNET IS BACK

December 17, 2024


TAGS:

Bitsight Security Research

Share:
 * Facebook
   
 * Twitter
   
 * LinkedIn
   

Written by Pedro Falé
Threat Researcher


INTRODUCTION

Imagine this: you're at home, eagerly waiting for the new device you ordered
from Amazon. The package arrives, you power it on, and start enjoying all the
benefits of 21st century technology—unaware that, as soon as you powered it on,
a scheme was unfolding within this device. Welcome to the world of BADBOX.

BADBOX is a large-scale cybercriminal operation selling off-brand Android TV
boxes, smartphones, and other Android electronics with preinstalled malware.
What does this mean? It means the device is infected before it even reaches your
hands.



These devices fall victim to a complex criminal scheme, where they are either
tampered with during the supply chain or sold by the manufacturer with the
ability to install APKs without the user's consent. They are then sold through
reputable/popular retailers, such as Amazon, eBay, AliExpress, and others. This
supply chain attack makes it extremely difficult for consumers to detect the
threat.


KEY TAKEAWAYS

At its peak, the BADBOX botnet was thought to consist of about 74,000
compromised Android-based devices. This botnet was presumed dead, after a push
to stop its spread. However, not only is it still active, but it also appears to
be larger and more versatile than previously anticipated.

 * Bitsight TRACE uncovered new BADBOX infrastructure. Telemetry shows over
   192,000 BADBOX infected devices — a number that keeps increasing
 * Of the overall infected devices: 160,000 infected devices belong to unique
   models not seen before, in particular a Yandex 4K QLED Smart TV and a T963
   Hisense Smartphone
 * The top affected countries: Russia, China, India, Belarus, Brazil and Ukraine


INTO THE BADBOX

This operation came to light in April 2023, when researcher Daniel Milisic
became suspicious of a 'T95' Android TV box he purchased, which was performing
unusual communications with unknown websites.

At the core of the BADBOX malware lies resemblances to a malware family known as
Triada. This malware family emerged around 2016, and it’s known for its
stealthiness as a firmware backdoor—a secret access someone has to your device.
BADBOX malware seems to be an adaptation of that.

A few months after its initial discovery, in October 2023, HUMAN’s Satori Threat
Intelligence and Research Team’s published a comprehensive report on BADBOX and
PEACHPIT botnet operations, further corroborating initial findings on the
malware and botnet size. We will be focusing on BADBOX devices, which are
alarmingly sold to consumers already compromised.


HOW DOES BADBOX WORK?

BADBOX exploits devices for activities such as residential proxying (using
backdoored devices as exit points), remote code installation, account abuse, and
ad fraud. One of its most dangerous features is the ability to install
additional code/modules without the user's consent, enabling threat actors to
deploy new schemes.

Researchers' discovery of BADBOX infections out-of-the-box suggests either a
manufacturing intention, where customizable system images allow remote code
installation by malicious actors, or a supply chain attack where malware is
embedded sometime during the development, manufacturing, shipping, and/or sales
processes. We cannot determine if these vectors are mutually exclusive in the
case of BADBOX.

As explained in a previous post about OEM infection, “The peril of neglecting
mobile apps”, infection at this level is exceptionally difficult to remove.
These methods share similarities with past attacks like Triada and Guerrilla,
which compromised Android libraries or system firmware. For now, we’re moving on
to how the BADBOX backdoor operates, before diving into Bitsight’s findings.

Below you can see a high-level overview of the activity flow behind the process
of BADBOX deployment:



The compromised firmware on the device ensures that, upon booting, it will
immediately try to connect to the malicious infrastructure in an attempt to load
its backdoor. The backdoor itself is capable of downloading secondary payloads
that allow further remote module installation without permissions.

Meaning that entirely new payloads could be constructed by the threat actors,
downloaded and executed, to perform new schemes beyond what we have visibility
as of now.

If you wish to further understand the underlying technical aspects of the
backdoor, take a look at HUMAN’s Technical Report, as it provides a more
extensive view of this process.

This was the last update on BADBOX at the time of writing. Now, let’s examine
currently active BADBOX operations in 2024.


TRACKING BADBOX BOTNET IN 2024


IS BADBOX DANGEROUS IN 2024?

Very much so. Countries should proactively pursue efforts to disrupt the botnet,
such as German authorities have recently, in the operation that affected 30,000
devices. Despite such efforts, it did not affect our telemetry, due to the
action being contained to Germany. The reality is that BADBOX still seems to be
very much alive and spreading. This was evident when Bitsight managed to
sinkhole a BADBOX domain, registering more than 160,000 unique IPs in a 24 hour
period. A number that has been steadily growing.

Until now, most research on the topic covers off-brand devices, on the principle
that “low-cost devices come at a different cost”. What if that wasn’t always the
case? Bitsight saw over 100,000 unique IPs from Yandex 4K QLED Smart TVs in 24
hours, and these devices aren’t necessarily cheap. Yandex is a well established
brand in Russia—think of it as their own Google enterprise.

How and why so many of these high-end devices became infected is still unknown
to us. What we do know, is that the devices are compromised, as evidenced in the
findings detailed below.


BADBOX INFECTIONS: YANDEX

An investigation on the domain coslogdydy[.]in revealed the following:

BADBOX infected devices upon booting and would immediately POST telemetry to try
and contact a C2 server, awaiting further instructions. The coslogdydy[.]in url
received several communications matching that of BADBOX:

    POST /terminal/client/apiInfo

(i.e: The Yandex TV model: YNDX-00091 and Instawall_T963)



    POST /terminal/client/register



This quickly indicated two things:

First, the models ranging from YNDX-00091 to YNDX-000102 are 4K Smart TVs from a
well-known brand, not cheap Android TV boxes. It’s the first time a major brand
Smart TV is seen directly communicating at such volume with a BADBOX command and
control (C2) domain, broadening the scope of affected devices beyond Android TV
boxes, tablets, and smartphones.

These YNDX Smart TV models weren't the only ones compromised. We saw
communications from the following devices:


OS: Android

Over 98% of traffic comes from both the YNDX Smart TV models and the T963
smartphone:


Traffic distribution of the 85% (~160,000 IPs in 24h)

Looking at the Yandex models, they are registered to a Yandex branch in
Switzerland registered in 2022. That name changed on November 21, 2023.


Models are disclosed here and here via mac address.

Second, let's talk volume. Telemetry collected indicates that more than 160,000
unique IPs communicate daily, a number that has been steadily growing.



The majority of communications originate from Russia with the YNDX Smart TV
model, followed by China with its Hisense Instwall_T963 smartphone model. Less
popular locations include India, Ukraine, and Belarus. Residual traffic (<1300
daily IPs) was also seen from Saudi Arabia, Kazakhstan, Czech Republic, United
States, France, and Netherlands.

According to the official website of alice yandex, the manufacturer of the YNDX
Smart TVs is actually “LLC Alice Laboratory” with the production site of “Higher
Industry Rus LLC” and not the Swiss branch “Intertech Services AG”, this
discrepancy is curious. On the same website, the users can buy directly to
Russia, Belarus, and Kazakhstan or through market.yandex[.]ru and other official
partner Russian vendor markets. This and brand popularity alone could explain
the lower visibility in other countries including Yandex recent split.


HUNTING OF BADBOX DOMAINS

Before packing our bags, we decided to see if we could uncover more BADBOX
infrastructure actively communicating, as this would be a strong indication that
the botnet is very much alive.

There were several pivot points here: previous IP assignment, URI paths, SSL
certificates. The latter produced more results but, nonetheless, we will go
through the results of each phase.


IP AND URI PATHING

Looking into the IPs pointing to coslogdydy[.]in (e.g., 170.187.159[.]173 and
103.145.58[.]236), and pivoting on the URI path of previously known BADBOX C2
domains such as yxcrl[.]com led to the discovery of the following domains:

 * cxlcyy[.]com
 * cxzyr[.]com
 * goologer[.]com
 * huuww[.]com
 * logcer[.]com
 * pccyy[.]com

 * pcxrl[.]com
 * pcxrlback[.]com
 * soyatea[.]online
 * ycxad[.]com
 * yydsmr[.]com

We can see some indicators: domains are added around the same day, they share
naming similarities to previous BADBOX domains. Domains contain ‘log’ wording
and variants of the known C2 domain ‘ycxrl[.]com’ named with a one letter
difference.

Both mentioned IPs, also show direct communications with the files
”/uploads/apk/20*_en.zip”, a path known as the C2 backdoor payload:



This further confirms its employment in the BADBOX operation.


SSL THUMBPRINT

Lastly the ssl thumbprinting creates a fingerprint for a ssl certificate,
through a hash function. This is great, because it enables us to easily query
any domains that use this certificate, especially relevant when the certificate
is self-signed. Which is the case.

The ssl_thumbprint generated from the certificate used by the domain
coslogdydy[.]in allows us to pivot: 5b3aa659cb8dece5c9a14d605c68a432b773969c
(saae)



36 domains share this self-signed ssl: Domain list here

Most of these domains seem to be missing A record IP, meaning we are unable to
communicate with those domains for further confirmation. This does mean that
operations could resume whenever by assigning an IP back to it.

However 2 domains were active: yydsmr[.]com and logcer[.]com by making a http
request to the known paths of BADBOX, we confirm their involvement. Both domains
responded with an encrypted string.



 



Perhaps the most shocking factor was the domain yydsmr[.]com having over 2
Million pDNS requests resolved in less than 3 months between 12-2023 and
03-2024. With another 620,000 between 03-2024 and 10-2024. This is a clear
indication of the large volume of this botnet.

Other interesting domains utilizing this self-signed certificate (saae) are
domains such as yydsmd[.]com. Not similar at all to yydsmr[.]com. From this
list, some shared the same IP (e.g., 172.105.119[.]17 and 139.162.40[.]221). The
interesting aspect is that they mostly communicate via the following type of
request:

    yydsmd.com/ota/api/conf/v1?m=bd6cb71c8046af6d0851276af7120e50&n=WIFI(1)&syn=1&t=1726327696455
    yydsmd.com/ota/api/tasks/v2?m=bd6cb71c8046af6d0851276af7120e50&n=WIFI(1)&syn=1&t=172632771700
        

This definitely looks like a malware check-in, and the response to this request
is an encrypted string. With somewhat similar entropy levels between the known
BADBOX domains that utilize the /terminal/client/ path.

/terminal/client/ path



And the new domains with the /ota/api/ path



We also know that BADBOX utilizes different custom encryption schemes depending
on the endpoint/uri path.

Currently active domains (respond with an encrypted string to the URI request)
are:

 * swiftcode[.]work
 * home[.]1ztop[.]work
 * veezy[.]sitev
 * bluefish[.]work
 * cast[.]jutux[.]work
 * echojoy[.]xyz
 * giddy[.]cc
 * jolted[.]vip
 * jutux[.]work

 * msohu[.]shop
 * mtcpmpm[.]com
 * old[.]1ztop[.]work
 * pixelscast[.]com
 * pixlo[.]cc
 * tvsnapp[.]com
 * www[.]jolted[.]vip
 * ztword[.]com

This could be a new adaptation from the BADBOX threat actors, or a new avenue
for their schemes—an entirely new investigation is required to explore this
further. For now, we will classify the following domains as unconfirmed to be
BADBOX malware, but nonetheless, malicious and somewhat related.


CONCLUSION

The BADBOX operation showcases how cyber criminals are further mastering the art
of using global supply chains to spread their malware far and wide. While this
blog post focused on infected devices with higher density in Russia and China,
BADBOX malware is an epidemic affecting all countries and most types of android
devices. Nevertheless, it's crucial to expose how threat actors are slowly
creeping their scope to not only off-brand bargain devices, but also
diversifying its victim ecosystem to some well-known brands, such as Yandex and
Hisense. Choosing trusted vendors becomes increasingly important for the
consumer. Likewise, choosing trusted partners becomes a priority for
enterprises. Not only is your data at risk, you might also be used for profit
and cover of malicious operations. While the crackdown on cyber crime
intensifies, selling cover to other cyber criminal groups via ‘compromised’
proxies also gains appeal.


INDICATORS OF COMPROMISE:

C2 Domains coslogdydy[.]in yydsmr[.]com logcer[.]com

 

SSL Certificate 5b3aa659cb8dece5c9a14d605c68a432b773969c

 

APKs com.yandex.tv.home com.instwall.launch com.mk.ifpd.digitalsignage
com.mk.ifpd.setup.guide com.android.launcher3


ON THIS PAGE

 * Introduction
 * Key Takeaways
 * Into the BADBOX
 * Tracking BADBOX Botnet in 2024
 * Hunting of BADBOX Domains
 * Conclusion
 * Indicators of Compromise:


▸ Latest Research




BitSight Technologies, Inc.
111 Huntington Ave, Suite 400
Boston,  MA  02199
United States of America

+1-617-245-0469




Free Cyber Security Reports
 * Security Ratings Snapshot
 * Attack Surface Report
 * Supply Chain Risk Report
 * Marsh McLennan Cyber Risk Report
 * Third-Party Vendor Risk Report

 * BitSight Academy
 * BitSight Knowledge Base
 * Privacy Statement
 * Corporate Social Responsibility Statement
 * Security
 * BitSight Security Ratings Access Terms
 * Website Terms Of Use
 * Get A Free Demo
 * Cybersecurity Glossary
 * Do Not Sell or Share My Personal Information
 * Order Fulfillment Policy
 * Cookie Preferences

Contact Us
© 2024 BitSight Technologies, Inc. and its Affiliates. All Rights Reserved.
 * Facebook
   
 * Instagram
   
 * Linkedin
   
 * Twitter
   
 * YouTube
   


This website uses cookies to enhance user experience, for advertising purposes,
and to analyze traffic on our website as described in our Privacy Policy. You
may choose to consent to our use of these technologies by selecting "Accept" or
select "Required Only" if you do not consent. To change your preferences or
learn more about our use of cookies select "Manage Settings".
Accept Required Only Manage Settings


Opens in new window
PDF Download
Word Download
Excel Download
PowerPoint Download
Document Download
Explore your accessibility options


close carousel