www.bitsight.com
Open in
urlscan Pro
2606:4700:10::6816:4bf2
Public Scan
URL:
https://www.bitsight.com/blog/badbox-botnet-back
Submission Tags: @nominet_threat_intel feedly-filtered-v1.0 reference_article_link confidence_null cluster_18645077 Search All
Submission: On December 18 via api from GB — Scanned from GB
Submission Tags: @nominet_threat_intel feedly-filtered-v1.0 reference_article_link confidence_null cluster_18645077 Search All
Submission: On December 18 via api from GB — Scanned from GB
Form analysis
0 forms found in the DOMText Content
This website is AudioEye enabled and is being optimized for accessibility. To open the AudioEye Toolbar, press "shift + =". Some assistive technologies may require the use of a passthrough function before this keystroke. For more information, activate the button labeled “Explore your accessibility options”. Skip to main content UTILITY * Blog * Partners * Request Demo * Chat With Us * Login See Your Rating Show/Hide Main Menu * Products * Enterprise Security * Security Performance Management * External Attack Surface Management * Cybersecurity Analytics * Security Ratings * Cyber Threat Intelligence NEW * SPM Integrations * Digital Supply Chain * Third-Party Risk Management * Vendor Risk Management * Continuous Monitoring * Vulnerability Detection & Response * Trust Management Hub * TPRM Integrations * Cyber Governance & Reporting * Cybersecurity Ratings * Cybersecurity Regulations * Cyber Risk Quantification * Cybersecurity Data Feed * Cyber Data Solutions * Cyber Underwriting & Risk Control * Cyber Insurance * Professional Services * Service Offerings Free Attack Surface Report Your attack surface is expanding—know exactly how it looks. Our report gives you the insights you need to see your external attack surface. Receive custom report * Solutions See beyond borders Bitsight enables risk and security leaders to see beyond the firewall — to the vendors and partners, clouds and applications, patches and programs — that introduce risk in your digital ecosystem. * By Use Cases * Exposure Management * Third-Party Risk Management * Reporting and Compliance * Cybersecurity Regulations NEW * Continuous Monitoring * Executive Reporting * Supply Chain Visibility * Investment Management * National Cybersecurity * By Industry * Financial Services * Insurance Services * Healthcare * Government * Technology * Energy/Utilities * Retail * Manufacturing * Education Bitsight to Acquire Cyber Threat Intelligence Leader Cybersixgill to Help Enterprises to Preempt Cyber Attacks Read release * Why Bitsight Trust in our data We combine real-time discovery of networks, assets, and vulnerabilities with our AI attribution engine and over 100 security researchers to amass one of the largest and mapped risk datasets in the world. * Why Bitsight * Why Bitsight * Security Ratings Leader * * Trusted Ratings * Data & Insights * Data Correlation & Studies * Data Discovery * Data Mapping & Attribution NEW * Cyber Data for Capital Markets NEW * Bitsight TRACE * Latest Security Research * Meet the Team Bitsight delivered 297% ROI for security leaders Forrester Consulting's Total Economic Impact™ Of Bitsight study shows a near 3x return on investment and material business outcomes for customers. Download Study * Company Building trust in the digital economy Bitsight is a cyber risk management leader transforming how companies manage exposure, performance, and risk for themselves and their third parties. * About Us * Our Story * Our Team * Trust Center * Moody's Partnership * Diversity & Inclusion * Press Releases * In the News * Connect with Us * Careers * * Open Positions * Events * Locations * Contact Us Bitsight to Acquire Cyber Threat Intelligence Leader Cybersixgill to Help Enterprises to Preempt Cyber Attacks Read release * Resources Did you know? More than 60% of Known Exploited Vulnerabilities remain unmitigated past deadlines and take, on average, 4.5 months to remediate. Source: Bitsight TRACE * Resources * Customer Stories * Reports & eBooks * Datasheets * Webinars * Videos * Cybersecurity Glossary * All Resources * Blog * Vulnerabilities & Incidents * Policy & Regulations * Exposure Management * Third-Party Risk Management * All Blog Posts Bitsight delivered 297% ROI for security leaders Read the study to see how bolstering your cyber security program with Bitsight can protect your business while improving your bottom line. Download Forrester Study See Your Rating * Blog * Partners * Login * Chat With Us * Request Demo BADBOX BOTNET IS BACK December 17, 2024 TAGS: Bitsight Security Research Share: * Facebook * Twitter * LinkedIn Written by Pedro Falé Threat Researcher INTRODUCTION Imagine this: you're at home, eagerly waiting for the new device you ordered from Amazon. The package arrives, you power it on, and start enjoying all the benefits of 21st century technology—unaware that, as soon as you powered it on, a scheme was unfolding within this device. Welcome to the world of BADBOX. BADBOX is a large-scale cybercriminal operation selling off-brand Android TV boxes, smartphones, and other Android electronics with preinstalled malware. What does this mean? It means the device is infected before it even reaches your hands. These devices fall victim to a complex criminal scheme, where they are either tampered with during the supply chain or sold by the manufacturer with the ability to install APKs without the user's consent. They are then sold through reputable/popular retailers, such as Amazon, eBay, AliExpress, and others. This supply chain attack makes it extremely difficult for consumers to detect the threat. KEY TAKEAWAYS At its peak, the BADBOX botnet was thought to consist of about 74,000 compromised Android-based devices. This botnet was presumed dead, after a push to stop its spread. However, not only is it still active, but it also appears to be larger and more versatile than previously anticipated. * Bitsight TRACE uncovered new BADBOX infrastructure. Telemetry shows over 192,000 BADBOX infected devices — a number that keeps increasing * Of the overall infected devices: 160,000 infected devices belong to unique models not seen before, in particular a Yandex 4K QLED Smart TV and a T963 Hisense Smartphone * The top affected countries: Russia, China, India, Belarus, Brazil and Ukraine INTO THE BADBOX This operation came to light in April 2023, when researcher Daniel Milisic became suspicious of a 'T95' Android TV box he purchased, which was performing unusual communications with unknown websites. At the core of the BADBOX malware lies resemblances to a malware family known as Triada. This malware family emerged around 2016, and it’s known for its stealthiness as a firmware backdoor—a secret access someone has to your device. BADBOX malware seems to be an adaptation of that. A few months after its initial discovery, in October 2023, HUMAN’s Satori Threat Intelligence and Research Team’s published a comprehensive report on BADBOX and PEACHPIT botnet operations, further corroborating initial findings on the malware and botnet size. We will be focusing on BADBOX devices, which are alarmingly sold to consumers already compromised. HOW DOES BADBOX WORK? BADBOX exploits devices for activities such as residential proxying (using backdoored devices as exit points), remote code installation, account abuse, and ad fraud. One of its most dangerous features is the ability to install additional code/modules without the user's consent, enabling threat actors to deploy new schemes. Researchers' discovery of BADBOX infections out-of-the-box suggests either a manufacturing intention, where customizable system images allow remote code installation by malicious actors, or a supply chain attack where malware is embedded sometime during the development, manufacturing, shipping, and/or sales processes. We cannot determine if these vectors are mutually exclusive in the case of BADBOX. As explained in a previous post about OEM infection, “The peril of neglecting mobile apps”, infection at this level is exceptionally difficult to remove. These methods share similarities with past attacks like Triada and Guerrilla, which compromised Android libraries or system firmware. For now, we’re moving on to how the BADBOX backdoor operates, before diving into Bitsight’s findings. Below you can see a high-level overview of the activity flow behind the process of BADBOX deployment: The compromised firmware on the device ensures that, upon booting, it will immediately try to connect to the malicious infrastructure in an attempt to load its backdoor. The backdoor itself is capable of downloading secondary payloads that allow further remote module installation without permissions. Meaning that entirely new payloads could be constructed by the threat actors, downloaded and executed, to perform new schemes beyond what we have visibility as of now. If you wish to further understand the underlying technical aspects of the backdoor, take a look at HUMAN’s Technical Report, as it provides a more extensive view of this process. This was the last update on BADBOX at the time of writing. Now, let’s examine currently active BADBOX operations in 2024. TRACKING BADBOX BOTNET IN 2024 IS BADBOX DANGEROUS IN 2024? Very much so. Countries should proactively pursue efforts to disrupt the botnet, such as German authorities have recently, in the operation that affected 30,000 devices. Despite such efforts, it did not affect our telemetry, due to the action being contained to Germany. The reality is that BADBOX still seems to be very much alive and spreading. This was evident when Bitsight managed to sinkhole a BADBOX domain, registering more than 160,000 unique IPs in a 24 hour period. A number that has been steadily growing. Until now, most research on the topic covers off-brand devices, on the principle that “low-cost devices come at a different cost”. What if that wasn’t always the case? Bitsight saw over 100,000 unique IPs from Yandex 4K QLED Smart TVs in 24 hours, and these devices aren’t necessarily cheap. Yandex is a well established brand in Russia—think of it as their own Google enterprise. How and why so many of these high-end devices became infected is still unknown to us. What we do know, is that the devices are compromised, as evidenced in the findings detailed below. BADBOX INFECTIONS: YANDEX An investigation on the domain coslogdydy[.]in revealed the following: BADBOX infected devices upon booting and would immediately POST telemetry to try and contact a C2 server, awaiting further instructions. The coslogdydy[.]in url received several communications matching that of BADBOX: POST /terminal/client/apiInfo (i.e: The Yandex TV model: YNDX-00091 and Instawall_T963) POST /terminal/client/register This quickly indicated two things: First, the models ranging from YNDX-00091 to YNDX-000102 are 4K Smart TVs from a well-known brand, not cheap Android TV boxes. It’s the first time a major brand Smart TV is seen directly communicating at such volume with a BADBOX command and control (C2) domain, broadening the scope of affected devices beyond Android TV boxes, tablets, and smartphones. These YNDX Smart TV models weren't the only ones compromised. We saw communications from the following devices: OS: Android Over 98% of traffic comes from both the YNDX Smart TV models and the T963 smartphone: Traffic distribution of the 85% (~160,000 IPs in 24h) Looking at the Yandex models, they are registered to a Yandex branch in Switzerland registered in 2022. That name changed on November 21, 2023. Models are disclosed here and here via mac address. Second, let's talk volume. Telemetry collected indicates that more than 160,000 unique IPs communicate daily, a number that has been steadily growing. The majority of communications originate from Russia with the YNDX Smart TV model, followed by China with its Hisense Instwall_T963 smartphone model. Less popular locations include India, Ukraine, and Belarus. Residual traffic (<1300 daily IPs) was also seen from Saudi Arabia, Kazakhstan, Czech Republic, United States, France, and Netherlands. According to the official website of alice yandex, the manufacturer of the YNDX Smart TVs is actually “LLC Alice Laboratory” with the production site of “Higher Industry Rus LLC” and not the Swiss branch “Intertech Services AG”, this discrepancy is curious. On the same website, the users can buy directly to Russia, Belarus, and Kazakhstan or through market.yandex[.]ru and other official partner Russian vendor markets. This and brand popularity alone could explain the lower visibility in other countries including Yandex recent split. HUNTING OF BADBOX DOMAINS Before packing our bags, we decided to see if we could uncover more BADBOX infrastructure actively communicating, as this would be a strong indication that the botnet is very much alive. There were several pivot points here: previous IP assignment, URI paths, SSL certificates. The latter produced more results but, nonetheless, we will go through the results of each phase. IP AND URI PATHING Looking into the IPs pointing to coslogdydy[.]in (e.g., 170.187.159[.]173 and 103.145.58[.]236), and pivoting on the URI path of previously known BADBOX C2 domains such as yxcrl[.]com led to the discovery of the following domains: * cxlcyy[.]com * cxzyr[.]com * goologer[.]com * huuww[.]com * logcer[.]com * pccyy[.]com * pcxrl[.]com * pcxrlback[.]com * soyatea[.]online * ycxad[.]com * yydsmr[.]com We can see some indicators: domains are added around the same day, they share naming similarities to previous BADBOX domains. Domains contain ‘log’ wording and variants of the known C2 domain ‘ycxrl[.]com’ named with a one letter difference. Both mentioned IPs, also show direct communications with the files ”/uploads/apk/20*_en.zip”, a path known as the C2 backdoor payload: This further confirms its employment in the BADBOX operation. SSL THUMBPRINT Lastly the ssl thumbprinting creates a fingerprint for a ssl certificate, through a hash function. This is great, because it enables us to easily query any domains that use this certificate, especially relevant when the certificate is self-signed. Which is the case. The ssl_thumbprint generated from the certificate used by the domain coslogdydy[.]in allows us to pivot: 5b3aa659cb8dece5c9a14d605c68a432b773969c (saae) 36 domains share this self-signed ssl: Domain list here Most of these domains seem to be missing A record IP, meaning we are unable to communicate with those domains for further confirmation. This does mean that operations could resume whenever by assigning an IP back to it. However 2 domains were active: yydsmr[.]com and logcer[.]com by making a http request to the known paths of BADBOX, we confirm their involvement. Both domains responded with an encrypted string. Perhaps the most shocking factor was the domain yydsmr[.]com having over 2 Million pDNS requests resolved in less than 3 months between 12-2023 and 03-2024. With another 620,000 between 03-2024 and 10-2024. This is a clear indication of the large volume of this botnet. Other interesting domains utilizing this self-signed certificate (saae) are domains such as yydsmd[.]com. Not similar at all to yydsmr[.]com. From this list, some shared the same IP (e.g., 172.105.119[.]17 and 139.162.40[.]221). The interesting aspect is that they mostly communicate via the following type of request: yydsmd.com/ota/api/conf/v1?m=bd6cb71c8046af6d0851276af7120e50&n=WIFI(1)&syn=1&t=1726327696455 yydsmd.com/ota/api/tasks/v2?m=bd6cb71c8046af6d0851276af7120e50&n=WIFI(1)&syn=1&t=172632771700 This definitely looks like a malware check-in, and the response to this request is an encrypted string. With somewhat similar entropy levels between the known BADBOX domains that utilize the /terminal/client/ path. /terminal/client/ path And the new domains with the /ota/api/ path We also know that BADBOX utilizes different custom encryption schemes depending on the endpoint/uri path. Currently active domains (respond with an encrypted string to the URI request) are: * swiftcode[.]work * home[.]1ztop[.]work * veezy[.]sitev * bluefish[.]work * cast[.]jutux[.]work * echojoy[.]xyz * giddy[.]cc * jolted[.]vip * jutux[.]work * msohu[.]shop * mtcpmpm[.]com * old[.]1ztop[.]work * pixelscast[.]com * pixlo[.]cc * tvsnapp[.]com * www[.]jolted[.]vip * ztword[.]com This could be a new adaptation from the BADBOX threat actors, or a new avenue for their schemes—an entirely new investigation is required to explore this further. For now, we will classify the following domains as unconfirmed to be BADBOX malware, but nonetheless, malicious and somewhat related. CONCLUSION The BADBOX operation showcases how cyber criminals are further mastering the art of using global supply chains to spread their malware far and wide. While this blog post focused on infected devices with higher density in Russia and China, BADBOX malware is an epidemic affecting all countries and most types of android devices. Nevertheless, it's crucial to expose how threat actors are slowly creeping their scope to not only off-brand bargain devices, but also diversifying its victim ecosystem to some well-known brands, such as Yandex and Hisense. Choosing trusted vendors becomes increasingly important for the consumer. Likewise, choosing trusted partners becomes a priority for enterprises. Not only is your data at risk, you might also be used for profit and cover of malicious operations. While the crackdown on cyber crime intensifies, selling cover to other cyber criminal groups via ‘compromised’ proxies also gains appeal. INDICATORS OF COMPROMISE: C2 Domains coslogdydy[.]in yydsmr[.]com logcer[.]com SSL Certificate 5b3aa659cb8dece5c9a14d605c68a432b773969c APKs com.yandex.tv.home com.instwall.launch com.mk.ifpd.digitalsignage com.mk.ifpd.setup.guide com.android.launcher3 ON THIS PAGE * Introduction * Key Takeaways * Into the BADBOX * Tracking BADBOX Botnet in 2024 * Hunting of BADBOX Domains * Conclusion * Indicators of Compromise: ▸ Latest Research BitSight Technologies, Inc. 111 Huntington Ave, Suite 400 Boston, MA 02199 United States of America +1-617-245-0469 Free Cyber Security Reports * Security Ratings Snapshot * Attack Surface Report * Supply Chain Risk Report * Marsh McLennan Cyber Risk Report * Third-Party Vendor Risk Report * BitSight Academy * BitSight Knowledge Base * Privacy Statement * Corporate Social Responsibility Statement * Security * BitSight Security Ratings Access Terms * Website Terms Of Use * Get A Free Demo * Cybersecurity Glossary * Do Not Sell or Share My Personal Information * Order Fulfillment Policy * Cookie Preferences Contact Us © 2024 BitSight Technologies, Inc. and its Affiliates. All Rights Reserved. * Facebook * Instagram * Linkedin * Twitter * YouTube This website uses cookies to enhance user experience, for advertising purposes, and to analyze traffic on our website as described in our Privacy Policy. You may choose to consent to our use of these technologies by selecting "Accept" or select "Required Only" if you do not consent. To change your preferences or learn more about our use of cookies select "Manage Settings". Accept Required Only Manage Settings Opens in new window PDF Download Word Download Excel Download PowerPoint Download Document Download Explore your accessibility options close carousel