FBI warns more than 1 million Android devices kidnapped by malware
NEWNow you can listen to News articles!
Malware can hack everything that connects to the Internet.
This includes its phones (both Android and iPhones) and laptops (either Windows, Mac or even less known systems such as Linux). The devices such as their Wi-Fi router and security cameras are not safe either.
But who would have thought that computer pirates are now also pointing to their smart televisions, transmission boxes, projectors and tablets? That’s right, the FBI warns that bad actors have kidnapped more than one million of these devices with malware, making them involuntary participants into a global network of cyber crimes.
Register for my free Cyberguy report
Get my best technological tips, urgent security alerts and exclusive offers delivered directly to your inbox. In addition, you will get instant access to my definitive scam survival guide, free when you join.

Remote control and intelligent television (Kurt “Cyberguy” Knutsson)
FBI warns: More than 1 million smart devices infected with Badbox 2.0 malware
The FBI warns that more than one million intelligent televisions, transmission boxes, projectors and tablets have been infected by a massive malware operation called Badbox 2.0. Malware makes participants in the home into a global network of cyber crimes, often before the user even drives them.
In a statement, the FBI says that Badbox 2.0 is commonly found on cheap Android devices manufactured in continental China. These include non -certified tablets, connected TV boxes and other Internet hardware of things. Many of the infected devices are sent with pre -installed malware. Others are compromised during the configuration, often through malicious firmware updates or applications laterally of unofficial markets.
The FBI warns the computer pirates who exploit obsolete routers. Look yours now
Once infected, the devices connect to a command and control server, which allows computer pirates to redirect malicious traffic through domestic networks, load fraudulent ads in the background and carry out credential fill attacks without the user knew. Essentially, his intelligent television could be silently helping someone to enter the accounts of other people.
Botnet is mainly used to convert infected devices into proxy residential nodes, providing computer pirates to anonymous access to real start IP addresses. That means that your TV or projector could help cybercriminals avoid safety systems, commit advertising fraud or online brute force accounts while hiding behind your Internet connection.

A person holding a tablet (Kurt “Cyberguy” Knutsson)
Do not click on that link! How to detect and prevent Phishing attacks on your entry tray
Badbox malware history: from TV boxes to more than 1 million infected devices
Badbox first appeared in 2023 in generic television boxes, such as T95. The original botnet was briefly interrupted in Germany in 2024 when security researchers “sank” the malware command servers. That eliminated part of the operation, but not for a long time. Only a week later, the malware reappeared in almost 200,000 devices, including more recognizable brands such as Hins intelligent phones and Yandex televisions.
By March 2025, Badbox had become Badbox 2.0, with more than 1 million active infections detected by the Human Satelli Threat Intelligence Team. Most devices are not compilations of open -certified Android source projects. These are not official Android TV products and are not protected by Google Play Protect.
Researchers say that malware has been seen in 222 countries. A significant number of infections is concentrated in Brazil, followed by the United States, Mexico and Argentina.
The FBI, who works with Google, Trend Micro, Human and The Shadowserver Foundation, recently interrupted communications by more than 500,000 infected devices and their control servers. However, the botnet continues to grow as the most compromised products reach consumers and go unnoticed.
Infection symptoms include strange application markets, disabled games protection settings or devices announced as unlocked or free transmission capable. Many of these products come from unknown brands and are sold through unofficial vendors. If you have recently bought a budget TV box or projector, especially one that is not certified by Google, you may want to take a closer look.

Smart TV (Kurt “Cyberguy” Knutsson)
Android Scam allows computer pirates to use their credit card remotely
How to know if your device could be infected with Badbox 2.0
If you ask if your intelligent television, transmission box, projector or tablet could be part of the botnet Badbox 2.0, here are some warning signs and verifications you can do.
1. bought a low -cost Android device from an unknown or unknown brand: The devices sold online through third -party vendors or unknown brands, especially if they are announced as “unlocked”, “Jailbreak” or that offer free transmission, have a higher risk. Models such as box T95 or other generic TV boxes android are known carriers. Specifically, the following devices have been identified as affected by Badbox Malware:
Device model: TV98, x96q_max_p, q96l2, x96q2, x96mini, s168, ums512_1h10_natv, x96_s400, x96mini_rp, tx3mini, Hy-001, mx10Pro, x96mini_plus1, longtv_n7501e, oxtv77, netboy X96q_PR01, AV-M9, ADT-3, OCBN, X96Mate_Plus, KM1, X96Q_PRO, PROJECTOR_T6P, X96QPRO-TM, SP7731E_1H10_NATIVE, M8SPROW, TV008, X96MINI_5G, Q96MAX, OBSTAR_TR43, Z6, Z6 Smart, Smart, Smart, Smart, Smart, Smart, Smart, Smart, Smart, Smart, Smart, Smart, Smart, Smart. KM9PRO, A15, Transpeed, KM7, ISINBOX, I96, Smart_TV, Fujicom-Smarttv, MXQ9PRO, MBOX, X96Q, ISINBOX, MBOX, R11, GAMEBOX, KM6, X96MAX_PLUS2, TV007, Q9 SICK, SP7731E X98K
2. Your device has no Google certificate: If your Android device is not compatible Google Play Protect or does not show the Play Protect certification In Play Store configuration, it is likely to be executed in an unbelievable version of Android. That is a great red flag. To verify:
- Open the Google Play Store.
- Touch the icon of your profile> Settings > About.
- Look for Reproduce the protection certification. If “the device is not certified”, that is a problem.
3. Suspicious behavior or strange applications: Look for unknown applications that you did not installed, applications labeled with foreign characters or alternative application stores on your device. Badbox -infected devices often come with pre -filled gloomy applications.
4. Google Play Protect is disabled: If Play Protect has been off without its knowledge or completely lacking, its device can be vulnerable to commitment.
5. Your Internet home is acting strange: If your network is unusually slow or your router shows unknown devices connected, one of its smart devices can be kidnapped and redirect traffic as part of a proxy residential network.
6. The device came with outdated or unofficial firmware: If your device does not receive software updates or has a strange update process, that is another potential sign that it is not legitimate or can be compromised.
The FBI warns of fraud aimed at victims with false hospitals and police officers
8 Ways to protect your Badbox 2.0 and Android Malware devices
Do you want to stay safe? Here are eight practical steps that you can take to protect your intelligent Badbox 2.0 malware and other hidden Android threats.
1. Use strong antivirus software: Protecting your devices begins with powerful antivirus protection. Malware such as Badbox 2.0 often comes pre -installed on cheap Android and non -certified devices, infecting them before they even turn them on. A reliable antivirus application can help detect hidden threats, block malicious traffic and warn you about suspicious behavior that could otherwise go unnoticed. Get my elections for the best antivirus protection winners 2025 for your Windows, Mac, Android and iOS devices.
2. Buy certified and trusted devices: Peel on Google certified devices or other recognized platforms. Avoid generic and out -of -branded boxes, tablets and projectors, especially if they are announced as unlocked or include free transmission. It is more likely that cheap and non -certified devices come with pre -installed malware.
3. Avoid lateral applications of unofficial sources: Do not install applications from third -party application stores or download APK files from unknown websites. These files can contain hidden malware. Use only official application stores such as Google Play Store that scan the applications to obtain threats.
4. Verify the configuration of your device to manipulate: Look for signs such as Google Play Protect Beat Alains, the presence of unknown application stores or suspicious applications that are executed in the background. These are possible signs that your device is committed.
Get the News business on the fly by clicking here
5. Monitor your network for unusual activity: If your internet suddenly slows down, or if you notice unknown devices in your Wi-Fi, investigate. Use your router configuration or a network monitoring application to track strange behavior or unauthorized connections.
6. Disconnect and replace suspicious hardware: If a device behaves strangely or bought at a non -reliable source, disagreement of your network. Consider replacing it with a product of an accredited brand and a verified seller.
7. Keep your devices and updated applications: Install system updates and application regularly. Although cheap devices do not always offer updates, Keep your software updated Reduces your risk. Choose brands that are known for providing reliable security patches.
8. ensure your router and domestic network: Its devices are as safe as the network to which they are connected. Establish a strong and unique password for your Wi-Fi router and update your firmware regularly. Disable remote access unless it is absolutely necessary and use WPA3 encryption if available. Consider using a password administrator to generate and store complex passwords. Get more details about me The best password administrators reviewed by experts of 2025 here.
As Badbox 2.0 continues to evolve, protecting its entire domestic network, not only individual devices, it has become essential to keep one step ahead of cybercriminals.
This is what you are doing wrong when the scammers call
Kurt key takeway
It is alarming how something as simple as a transmission or project R budget could be working in silence for cybercriminals. As smart devices become part of almost everything we do, be a careful and informed issue of consumers more than ever. Small steps such as buying trusted brands and avoiding unofficial downloads can make a big difference to keep personal data and home safe.
Click here to get the News application
With more than one million infected devices, who should take responsibility: manufacturers, governments or consumers? Get us knowing in Cyberguy.com/contact.
To obtain more technological tips and safety alerts, subscribe to my free Cyberguy Report newsletter when you head Cyberguy.com/newsletter.
Ask Kurt or tell us what stories you would like us to cover.
Follow Kurt in his social channels:
- YouTube
Answers to the most informed Cyberguys questions:
- What is the best way to protect your MAC devices, Windows, iPhone and Android to be pirate?
- What is the best way to stay private, safe and anonymous while navigating the web?
- How can I get rid of robocalls with data elimination applications and services?
- How do I eliminate my private internet data?
New Kurt:
- Try the new Cyberguy games (crosswords, words searches, trivia and more!)
- Cyberguy exclusive coupons and offers
Copyright 2025 Cyberguy.com. All rights reserved.
Kurt “Cyberguy” Knutsson is a award -winning technological journalist who has a deep love for technology, equipment and devices that improve life with their contributions for News & News Business Startzing Mornings in “News & Friends”. Have a technological question? Get the free Kurt’s free newsletter, share your voice, an idea of the story or comment on Cyberguy.com.


