Google Targets Malware Affecting 10M Android Devices and Botnets

Edward Zhou
Edward Zhou

CEO & Co-Founder

 
July 19, 2025
3 min read

BadBox 2.0 Malware Threat

TV box with remote

Malware identified as "BadBox 2.0" has affected over 10 million Android devices, including various no-name TV streaming devices, tablets, and projectors. Google has initiated a lawsuit in New York to dismantle what it describes as a "criminal enterprise" operating as a botnet. The botnet, referred to as the "largest known botnet of internet-connected TV devices," poses a risk of being utilized for serious cybercrimes, including ransomware and DDoS attacks.

The malware proliferates through low-cost Android devices manufactured in China. It can be preinstalled or downloaded as Trojanized applications from unofficial app stores during setup. Hackers exploit these devices to sell access to cybercriminals, allowing them to conduct hacking activities in the U.S. and beyond. Google has identified several affected models, including Android TV boxes like X88 Pro 10, T95, MXQ Pro, and QPLOVE Q9. For a more comprehensive list, refer to Human Security.

Google's lawsuit claims the hackers, based in China, include at least 25 individuals or entities. The company is asking the court for a permanent injunction to cease operations related to the BadBox malware, which also generates fraudulent clicks for mobile ads. The legal action aims to disrupt the botnet by targeting the command-and-control servers that manage the malware's operations.

Legal Action Against Cybercriminals

Google's legal strategy involves pursuing a RICO case against the operators of the BadBox 2.0 botnet. The company seeks to shut down over 100 domains linked to the malware, which are hosted by major web service providers such as GoDaddy, Cloudflare, and Amazon. This legal route is considered necessary because traditional methods of using monitoring and ad account shutdowns have proven insufficient.

The lawsuit highlights the infrastructure behind the botnet, which includes various groups responsible for different criminal activities. The Infrastructure Group manages the command-and-control setup, while the Backdoor Malware Group develops the malware itself. Additionally, the Evil Twin Group creates fraudulent apps to generate ad revenue, and the Ad Games Group uses fake games for similar purposes.

Google's actions are prompted by the FBI's warning about BadBox 2.0 and its potential for large-scale ad fraud. The botnet has been described as a significant threat, particularly in regions like Brazil, the U.S., Mexico, and Argentina. For an overview of the botnet's impact, see The Hacker News.

Anatsa Malware in Google Play Store

Malware on phone

A different malware strain, named "Anatsa," infiltrated the Google Play Store by masquerading as a legitimate document viewer app. This Trojan, which garnered over 50,000 downloads before its removal, is designed to access banking applications covertly. ThreatFabric reported that the app initially appeared legitimate but was modified to deliver malicious updates that hijack access to U.S. mobile banking apps.

Anatsa can perform various malicious actions, including credential theft and keylogging, while displaying fake notifications to mislead users. This incident raises concerns about the effectiveness of Google Play Protect in safeguarding against apps that transition from legitimate to malicious post-download.

Google's security measures have been called into question, especially regarding the app's quick transformation into a threat approximately six weeks after its launch. This underscores the need for robust security practices to combat mobile malware threats effectively.

Importance of Advanced Security Solutions

The rising prevalence of malware like BadBox 2.0 and Anatsa highlights the critical need for advanced security solutions. Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture, which integrates networking and security across various environments—from endpoints and private networks to cloud, remote access, and containers.

Our offerings include:

  • AI-Powered Zero Trust Platform
  • Advanced AI Authentication Engine
  • Secure Access Service Edge (SASE)
  • Cloud Access Security Broker
  • Micro-Segmentation for Secure Environments

Explore how Gopher Security can enhance your organization's cybersecurity posture by visiting Gopher Security for more information or to contact us.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article