Germany cuts hacker access to 30,000 devices infected with BadBox malware

Avatar

Germany’s cybersecurity agency reported on Thursday that at least 30,000 internet-connected devices sold across the country were infected with pre-installed malware known as BadBox.

In a statement, the Federal Office for Information Security (BSI) announced that it had blocked communication between the infected devices and the criminals’ control servers, preventing further damage. However, devices with outdated software remain at risk.

The hacker group behind BadBox primarily targets Android devices — such as smartphones, tablets, and connected TV streaming boxes — embedding malicious code into their firmware. According to previous reports, the operators of BadBox typically target low-cost devices, which are sold through online retailers or resale sites. 

These devices come preloaded with Triada, a type of malware that creates a backdoor allowing attackers to remotely control the device, inject additional malware, and exploit the device for various illicit activities.

The BSI reported that the BadBox malware it found on infected devices, like digital photo frames and streaming devices, can secretly create email and messenger accounts. This enables the malware to spread fake news, carry out advertising fraud, and serve as a proxy, allowing criminals to exploit the devices’ internet connections for cyberattacks or illegal content distribution.

German cyber authorities said they employed a method known as sinkholing to redirect traffic from these devices to safe servers, cutting hackers’ access to them. The BSI stated that all German internet service providers with over 100,000 customers are now legally required to redirect BadBox traffic to its sinkhole.

The BSI did not disclose the companies that manufactured the affected devices but urged consumers who received warnings from the authorities to disconnect these devices from the internet or stop using them. 

“There is no immediate danger for these devices as long as the BSI maintains the sinkholing measure,” the agency stated.

“Malware on internet-enabled products is unfortunately not a rare phenomenon. Outdated firmware versions, in particular, pose a huge risk,” BSI president Claudia Plattner said in a statement. “We all have a duty here: manufacturers and retailers have a responsibility to ensure that such devices do not come onto the market.”

Last October, researchers at the cyber firm Human Security discovered that over 70,000 Android smartphones, CTV boxes and tablet devices from at least one Chinese manufacturer were shipped pre-installed with Triada malware, which is linked to BadBox’s operators.

Human Security called BadBox “an incredibly sophisticated operation,” noting that it is nearly impossible for users to tell if their devices are compromised. Of the devices researchers acquired from online retailers, 80% were infected with BadBox, “which demonstrates how widely they were circulating on the market.”

The company said the hackers behind BadBox likely operate out of China and have access to hardware supply chains.

NewsCybercrimeMalware
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

DoJ Indicts 14 North Koreans for $88M IT Worker Fraud Scheme Over Six Years

Next Post

Japanese game and anime publisher reportedly pays $3 million ransom to Russia-linked hackers

Related Posts

New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

North Korean threat actors have been observed using a Linux variant of a known malware family called FASTCash to steal funds as part of a financially-motivated campaign. The malware is "installed on payment switches within compromised networks that handle card transactions for the means of facilitating the unauthorized withdrawal of cash from ATMs," a security researcher who goes by HaxRob said.
Omega Balla
Read More

PyPI Repository Found Hosting Fake Crypto Wallet Recovery Tools That Steal User Data

A new set of malicious packages has been unearthed in the Python Package Index (PyPI) repository that masqueraded as cryptocurrency wallet recovery and management services, only to siphon sensitive data and facilitate the theft of valuable digital assets. "The attack targeted users of Atomic, Trust Wallet, Metamask, Ronin, TronLink, Exodus, and other prominent wallets in the crypto ecosystem,"
Avatar
Read More