In recent news, a new variant of the Vo1d malware botnet has surfaced and has rapidly spread to infect over 1.5 million Android TV devices in 226 countries. With nearly 800,000 active bots as of February 2025, this botnet has become one of the largest seen in recent years. The botnet’s main function is to turn compromised devices into proxy servers, concealing the origin of cybercriminal activities. Since November 2024, researchers at Xlab have been monitoring this new variant and have observed significant spikes in infections, particularly in countries like Brazil, South Africa, and Indonesia.
The Vo1d botnet is equipped with advanced encryption and stealth techniques, utilizing sophisticated RSA and custom XXTEA encryption methods, as well as a robust domain generation algorithm (DGA) infrastructure. This intricate design is specifically crafted to evade detection by security tools and researchers. With a command and control network comprising over 21,000 C2 domains protected by 2048-bit RSA encryption, the botnet is extremely challenging to disrupt. Its scale and capabilities have surpassed those of previous major botnets like Bigpanzi and Mirai, both notorious for carrying out large-scale DDoS attacks.
Furthermore, the operations of the Vo1d botnet involve a unique “rental-return” system, where cybercriminal groups lease devices for their illicit activities. This dynamic leads to rapid fluctuations in the infection count, as devices are both added and removed from the botnet. The leasing model enables Vo1d operators to maximize the utilization of their infrastructure while minimizing the risk of detection. This cyclical pattern of infections and removals helps sustain the botnet’s effectiveness and stealth, ensuring its continuous growth and utilization in cybercrime operations. Primarily, the botnet is used to facilitate activities such as ad fraud, where compromised devices mimic user interactions to generate revenue for fraudsters.
In light of the escalating threat posed by Vo1d, researchers are urging Android TV users to adopt a comprehensive security approach. This includes purchasing devices from reputable vendors, keeping firmware up to date, refraining from downloading third-party apps, and deactivating remote access features on idle devices. Additionally, researchers recommend segregating IoT devices from critical systems containing sensitive data to mitigate the potential damage from infections. These precautionary measures are essential for thwarting future infections and mitigating the risk of being ensnared in the expanding Vo1d botnet.
As the Vo1d botnet continues to grow and evolve, vigilance and proactive security practices are vital for safeguarding against its insidious activities. Users must remain diligent in protecting their devices and networks to prevent falling victim to this pervasive cyber threat.

