Cybersecurity firm HUMAN has successfully disrupted a complex cybercriminal operation involving backdoored mobile and CTV Android devices sold through major retailers. The campaign, known as BADBOX, utilized the Triada malware to carry out various fraudulent activities, such as identity theft, creation of fake accounts, and stealing of one-time passwords.
HUMAN collaborated with tech giants Google and Apple to disrupt the ad fraud component of BADBOX, named “PEACHPIT.” In addition, the researchers shared valuable information about the facilities responsible for producing the infected devices with law enforcement agencies. This information included details about the organizations and individuals believed to be behind the PEACHPIT operation.
Roger Grimes, a data-driven defense evangelist at KnowBe4, commented on the discovery, pointing out that compromised devices from vendors have been a longstanding issue. He emphasized the need to determine whether the compromises were intentional or if the vendors were unaware of the backdoors. Grimes also questioned the steps taken by the involved vendors to prevent such incidents in the future. To mitigate the risk, Grimes advised consumers to purchase devices from reputable vendors with a track record of customer trust.
The BADBOX scheme stands out due to its sophistication. Gavin Reid, Chief Information Security Officer of HUMAN, described it as an incredibly sophisticated operation that capitalizes on distributed supply chains to target unsuspecting consumers who buy devices from trusted platforms and retailers. The deceptive nature of the scheme makes it extremely difficult for users to detect if their devices are compromised. HUMAN’s acquisition of devices from online retailers revealed that an alarming 80 percent of them were infected with BADBOX, underscoring the wide circulation of the malware in the market.
This revelation highlights an ongoing challenge in the cybersecurity landscape. The placing of backdoors into devices during the manufacturing process is not a new problem. However, it serves as a reminder that such attacks are still prevalent. As technology advances, cybercriminals continue to find ways to exploit supply chains, ultimately compromising devices and posing a significant threat to end users.
Cooperation and collaboration between cybersecurity firms, tech companies, and law enforcement agencies are essential to disrupt and dismantle cybercriminal operations. By sharing knowledge and working together, stakeholders can proactively identify and mitigate emerging threats. The successful disruption of BADBOX showcases the strategic importance of these partnerships in safeguarding users and preventing further harm.
To protect against compromised devices, consumers are advised to exercise caution when purchasing from unfamiliar or knock-off sources. Trustworthy vendors with established customer trust are less likely to sell compromised devices, and they provide better support in case of any issue. However, it is important to note that even reputable vendors can fall victim to compromises. Hence, regularly updating and maintaining strong security measures on devices is crucial to stay protected from potential cyber threats.
The BADBOX operation serves as a wake-up call for both consumers and industry players. It highlights the need for continuous vigilance and proactive measures to combat evolving cyber threats. With cybercriminals constantly adapting their tactics, the cybersecurity community must remain vigilant and agile in order to stay one step ahead.

