HomeCyber BalkansBADBOX Injects Malware into the Hardware Supply Chain.

BADBOX Injects Malware into the Hardware Supply Chain.

Published on

spot_img

Cybersecurity firm HUMAN has successfully disrupted a complex cybercriminal operation involving backdoored mobile and CTV Android devices sold through major retailers. The campaign, known as BADBOX, utilized the Triada malware to carry out various fraudulent activities, such as identity theft, creation of fake accounts, and stealing of one-time passwords.

HUMAN collaborated with tech giants Google and Apple to disrupt the ad fraud component of BADBOX, named “PEACHPIT.” In addition, the researchers shared valuable information about the facilities responsible for producing the infected devices with law enforcement agencies. This information included details about the organizations and individuals believed to be behind the PEACHPIT operation.

Roger Grimes, a data-driven defense evangelist at KnowBe4, commented on the discovery, pointing out that compromised devices from vendors have been a longstanding issue. He emphasized the need to determine whether the compromises were intentional or if the vendors were unaware of the backdoors. Grimes also questioned the steps taken by the involved vendors to prevent such incidents in the future. To mitigate the risk, Grimes advised consumers to purchase devices from reputable vendors with a track record of customer trust.

The BADBOX scheme stands out due to its sophistication. Gavin Reid, Chief Information Security Officer of HUMAN, described it as an incredibly sophisticated operation that capitalizes on distributed supply chains to target unsuspecting consumers who buy devices from trusted platforms and retailers. The deceptive nature of the scheme makes it extremely difficult for users to detect if their devices are compromised. HUMAN’s acquisition of devices from online retailers revealed that an alarming 80 percent of them were infected with BADBOX, underscoring the wide circulation of the malware in the market.

This revelation highlights an ongoing challenge in the cybersecurity landscape. The placing of backdoors into devices during the manufacturing process is not a new problem. However, it serves as a reminder that such attacks are still prevalent. As technology advances, cybercriminals continue to find ways to exploit supply chains, ultimately compromising devices and posing a significant threat to end users.

Cooperation and collaboration between cybersecurity firms, tech companies, and law enforcement agencies are essential to disrupt and dismantle cybercriminal operations. By sharing knowledge and working together, stakeholders can proactively identify and mitigate emerging threats. The successful disruption of BADBOX showcases the strategic importance of these partnerships in safeguarding users and preventing further harm.

To protect against compromised devices, consumers are advised to exercise caution when purchasing from unfamiliar or knock-off sources. Trustworthy vendors with established customer trust are less likely to sell compromised devices, and they provide better support in case of any issue. However, it is important to note that even reputable vendors can fall victim to compromises. Hence, regularly updating and maintaining strong security measures on devices is crucial to stay protected from potential cyber threats.

The BADBOX operation serves as a wake-up call for both consumers and industry players. It highlights the need for continuous vigilance and proactive measures to combat evolving cyber threats. With cybercriminals constantly adapting their tactics, the cybersecurity community must remain vigilant and agile in order to stay one step ahead.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...