Kimwolf Botnet Hackers Linked to Badbox 2.0 Android TV Botnet

by Chief Editor

The Botnet Battleground: How Compromised Streaming Boxes Are Fueling Cybercrime

Cybercriminals are increasingly exploiting vulnerabilities in Internet of Things (IoT) devices, particularly Android TV streaming boxes, to build and expand powerful botnets. Recent investigations reveal a concerning link between the Kimwolf botnet, which has infected over 2 million devices, and Badbox 2.0, a vast China-based botnet pre-installed on many streaming boxes. This connection highlights a growing trend: malware coming pre-installed on devices purchased from major online retailers like Amazon, and AliExpress.

Kimwolf and Badbox 2.0: An Unholy Alliance

The cybercriminals behind Kimwolf recently compromised the control panel for Badbox 2.0, gaining access to a network of over ten million devices. This development, first reported by KrebsOnSecurity, is significant because it allows the Kimwolf operators to bypass recent security patches implemented by residential proxy providers. Normally, Kimwolf spreads by exploiting vulnerabilities in these providers to access devices behind firewalls. With direct access to Badbox 2.0, they can load the Kimwolf malware directly onto compromised TV boxes.

The FBI and Google are actively investigating the individuals behind Badbox 2.0. Initial clues point to individuals using the nicknames “Dort” and “Snow” as the current administrators of Kimwolf. A screenshot obtained by KrebsOnSecurity shows several authorized users of the Badbox 2.0 control panel, including an account linked to Dort.

The Players Behind the Scenes

Investigations have uncovered potential connections between key individuals and the Badbox 2.0 infrastructure. Chen Daihai and Zhu Zhiyu, linked to Beijing Astrolink Wireless Digital Technology Co. Ltd., appear to have access to the Badbox 2.0 botnet panel. Email addresses and associated online accounts reveal a pattern of activity tied to domains flagged as part of the Badbox 2.0 distribution network, such as asmeisvip[.]net and moyix[.]com.

Further investigation revealed that the email address [email protected], used by “Chen” in the Badbox 2.0 panel, is associated with multiple China-based technology companies. This connection, along with shared passwords across various accounts, suggests a coordinated effort to maintain control over the botnet.

How These Botnets Operate

Badbox 2.0 and Kimwolf operate by creating network proxies on compromised devices, turning unsuspecting users’ homes into hubs for criminal activities. This can include advertising fraud, distributed denial-of-service (DDoS) attacks, and potentially other malicious actions. The FBI warned in June 2025 that cybercriminals are gaining unauthorized access to home networks by pre-configuring devices with malware or infecting them during the setup process.

Kimwolf’s unique spreading method involves tricking residential proxy services into relaying malicious commands to vulnerable devices on local networks. This technique allows the botnet to bypass traditional security measures and exploit devices that may not be adequately protected.

Protecting Yourself from IoT Botnets

The proliferation of compromised IoT devices poses a significant threat to internet security. Here are some steps you can take to protect yourself:

  • Be cautious when purchasing Android TV boxes: Avoid unofficial or suspiciously cheap devices, especially those advertised as providing access to free streaming content.
  • Check for Google Play Protect certification: Ensure your devices have Google Play Protect enabled and up-to-date.
  • Retain your operating system updated: Regularly update the operating system and software on all your IoT devices.
  • Download apps from official marketplaces: Avoid downloading apps from unofficial or third-party marketplaces.
  • Monitor your network traffic: Look for unexplained or suspicious internet activity.

The Future of IoT Security

The Badbox 2.0 and Kimwolf saga underscores the urgent need for improved IoT security measures. Manufacturers need to prioritize security during the design and production of IoT devices, and retailers must take responsibility for vetting the products they sell. Consumers also need to be more aware of the risks associated with compromised devices and take steps to protect their home networks.

As IoT devices become increasingly prevalent, the threat of botnet attacks will likely grow. Expect to see more sophisticated malware and more targeted attacks aimed at exploiting vulnerabilities in these devices. Collaboration between law enforcement, security researchers, and the tech industry will be crucial in combating this evolving threat.

FAQ

Q: What is a botnet?
A: A botnet is a network of compromised computers or IoT devices controlled remotely by a single attacker.

Q: How can I tell if my device is infected?
A: Look for unexplained internet traffic, slow performance, or suspicious apps on your device.

Q: What should I do if I suspect my device is part of a botnet?
A: Contact the FBI’s Internet Crime Complaint Center (IC3) at www.ic3.gov.

Q: Is my smart TV at risk?
A: Yes, smart TVs and other IoT devices are vulnerable to botnet infections.

Q: What is Badbox 2.0?
A: Badbox 2.0 is a large botnet comprised of compromised Android devices, often streaming boxes, used for malicious purposes.

Did you understand? The original Badbox campaign was disrupted in 2024, but Badbox 2.0 quickly emerged as a successor.

Pro Tip: Regularly review the apps installed on your devices and remove any that you don’t recognize or no longer apply.

Stay informed about the latest cybersecurity threats and take proactive steps to protect your devices and your network. Share this article with your friends and family to help raise awareness about the dangers of IoT botnets.

You may also like

Leave a Comment