Connect with us

Technology

FBI warns over 1 million Android devices hijacked by malware

Published

on

FBI warns over 1 million Android devices hijacked by malware

NEWYou can now listen to Fox News articles!

Everything that connects to the internet can be hacked by malware. 

This includes your phones (both Android and iPhones) and laptops (whether Windows, Mac or even lesser-known systems like Linux). Devices like your Wi-Fi router and security cameras aren’t safe either.

But who would have thought hackers are now targeting your smart TVs, streaming boxes, projectors and tablets, too? That’s right, the FBI warns that bad actors have hijacked over a million of these devices with malware, turning them into unwitting participants in a global cybercrime network.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.

Advertisement

Remote control and smart TV (Kurt “CyberGuy” Knutsson)

FBI warns: Over 1 million smart devices infected with BadBox 2.0 malware

The FBI is warning that more than a million smart TVs, streaming boxes, projectors and tablets have been infected by a massive malware operation called BadBox 2.0. The malware turns home electronics into participants in a global network of cybercrime, often before the user even powers them on.

In a statement, the FBI says BadBox 2.0 is commonly found on cheap Android-based devices manufactured in mainland China. These include uncertified tablets, connected TV boxes and other Internet of Things hardware. Many of the infected devices ship with the malware preinstalled. Others are compromised during setup, often through malicious firmware updates or sideloaded apps from unofficial marketplaces.

FBI WARNS OF HACKERS EXPLOITING OUTDATED ROUTERS. CHECK YOURS NOW

Once infected, the devices connect to a command and control server, allowing hackers to reroute malicious traffic through home networks, load fraudulent ads in the background and carry out credential-stuffing attacks without the user knowing. Essentially, your smart TV could be quietly helping someone break into other people’s accounts.

Advertisement

The botnet is primarily used to turn infected devices into residential proxy nodes, providing hackers with anonymous access to real home IP addresses. That means your TV or projector might unknowingly be helping cybercriminals bypass security systems, commit ad fraud or brute-force online accounts while hiding behind your internet connection.

person with tablet

A person holding a tablet (Kurt “CyberGuy” Knutsson)

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

Badbox malware history: From TV boxes to over 1 million infected devices

BadBox first appeared in 2023 on generic TV boxes, such as the T95. The original botnet was briefly disrupted in Germany in 2024 when security researchers “sinkholed” the malware’s command servers. That wiped out part of the operation, but not for long. Just a week later, the malware reappeared on nearly 200,000 devices, including more recognizable brands like Hisense smartphones and Yandex TVs.

By March 2025, BadBox had evolved into BadBox 2.0, with more than 1 million active infections detected by HUMAN’s Satori Threat Intelligence team. The majority of devices are uncertified Android Open Source Project builds. These are not official Android TV OS products and are not protected by Google Play Protect.

Researchers say the malware has been spotted in 222 countries. A significant number of infections are concentrated in Brazil, followed by the United States, Mexico and Argentina.

Advertisement

The FBI, working with Google, Trend Micro, HUMAN and the Shadowserver Foundation, recently disrupted communications between more than 500,000 infected devices and their control servers. However, the botnet continues to grow as more compromised products reach consumers and remain unnoticed.

Symptoms of infection include strange app marketplaces, disabled Play Protect settings or devices advertised as being unlocked or capable of free streaming. Many of these products come from unknown brands and are sold through unofficial sellers. If you have recently purchased a budget Android TV box or projector, especially one that is not certified by Google, you may want to take a closer look.

a smart television

Smart TV (Kurt “CyberGuy” Knutsson)

ANDROID SCAM LETS HACKERS USE YOUR CREDIT CARD REMOTELY

How to tell if your device might be infected with BadBox 2.0

If you’re wondering whether your smart TV, streaming box, projector or tablet could be part of the BadBox 2.0 botnet, here are some warning signs and checks you can do.

1. You bought a low-cost Android-based device from an unknown or no-name brand: Devices sold online through third-party sellers or unknown brands, especially if advertised as “unlocked,” “jailbroken” or offering free streaming, are at higher risk. Models like the T95 box or other generic Android TV boxes are known carriers. Specifically, the following devices have been identified as impacted by BadBox malware:

Advertisement

Device model: TV98, X96Q_Max_P, Q96L2, X96Q2, X96mini, S168, ums512_1h10_Natv, X96_S400, X96mini_RP, TX3mini, HY-001, MX10PRO, X96mini_Plus1, LongTV_GN7501E, Xtv77, NETBOX_B68, X96Q_PR01, AV-M9, ADT-3, OCBN, X96MATE_PLUS, KM1, X96Q_PRO, Projector_T6P, X96QPRO-TM, sp7731e_1h10_native, M8SPROW, TV008, X96Mini_5G, Q96MAX, Orbsmart_TR43, Z6, TVBOX, Smart, KM9PRO, A15, Transpeed, KM7, iSinbox, I96, SMART_TV, Fujicom-SmartTV, MXQ9PRO, MBOX, X96Q, isinbox, Mbox, R11, GameBox, KM6, X96Max_Plus2, TV007, Q9 Stick, SP7731E, H6, X88, X98K, TXCZ

2. Your device is not Google-certified: If your Android device doesn’t support Google Play Protect or doesn’t show the Play Protect certification in the Play Store settings, it’s likely running on an uncertified version of Android. That’s a major red flag. To check:

  • Open the Google Play Store.
  • Tap your profile icon > SettingsAbout.
  • Look for Play Protect certification. If it says “Device is not certified,” that’s a problem.

3. Suspicious behavior or strange apps: Look for unfamiliar apps you didn’t install, apps labeled with foreign characters or alternative app stores on your device. BadBox-infected devices often come with shady apps preloaded.

4. Google Play Protect is disabled: If Play Protect has been turned off without your knowledge or is missing altogether, your device may be vulnerable to compromise.

5. Your home internet is acting strange: If your network is unusually slow or your router shows unknown devices connected, one of your smart devices may be hijacked and rerouting traffic as part of a residential proxy network.

6. The device came with outdated or unofficial firmware: If your device doesn’t receive software updates or has a strange update process, that’s another potential sign it’s not legit or may be compromised.

Advertisement

FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICE

8 ways to protect your devices from BadBox 2.0 and Android malware

Want to stay safe? Here are eight practical steps you can take to protect your smart devices from BadBox 2.0 malware and other hidden Android threats.

1. Use strong antivirus software: Protecting your devices starts with powerful antivirus protection. Malware like BadBox 2.0 often comes preinstalled on cheap, uncertified Android devices, infecting them before you even power them on. A trusted antivirus app can help detect hidden threats, block malicious traffic and warn you about suspicious behavior that might otherwise go unnoticed. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Only buy certified and trusted devices: Stick to devices certified by Google or other recognized platforms. Avoid generic or off-brand Android boxes, tablets and projectors, especially if they are advertised as unlocked or include free streaming. Cheap, uncertified devices are more likely to come with malware preinstalled.

3. Avoid sideloading apps from unofficial sources: Do not install apps from third-party app stores or download APK files from unknown websites. These files can contain hidden malware. Use only official app stores like the Google Play Store that scan apps for threats.

Advertisement

4. Check your device settings for tampering: Look for signs like Google Play Protect being turned off, the presence of unfamiliar app stores or suspicious apps running in the background. These are possible signs your device is compromised.

5. Monitor your network for unusual activity: If your internet slows down suddenly, or you notice unknown devices on your Wi-Fi, investigate. Use your router’s settings or a network monitoring app to track strange behavior or unauthorized connections.

6. Disconnect and replace suspicious hardware: If a device is behaving oddly or was purchased from an untrusted source, unplug it from your network. Consider replacing it with a product from a reputable brand and a verified seller.

7. Keep your devices and apps updated: Install system and app updates regularly. Even though cheap devices may not always offer updates, keeping your software current reduces your risk. Choose brands that are known for providing reliable security patches.

Advertisement

8. Secure your router and home network: Your devices are only as safe as the network they’re connected to. Set a strong, unique password for your Wi-Fi router and update its firmware regularly. Disable remote access unless absolutely necessary and use WPA3 encryption if available. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.

As BadBox 2.0 continues to evolve, protecting your entire home network, not just individual devices, has become essential to staying one step ahead of cybercriminals.

THIS IS WHAT YOU ARE DOING WRONG WHEN SCAMMERS CALL

Kurt’s key takeaway

It’s alarming how something as simple as a budget streaming box or projector could be quietly working for cybercriminals. As smart devices become part of almost everything we do, being a careful and informed consumer matters more than ever. Small steps like buying from trusted brands and avoiding unofficial downloads can make a big difference in keeping your home and personal data safe.

Advertisement

With over a million devices infected, who should be held accountable: manufacturers, governments or consumers? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Stranger Things 5’s first trailer promises an epic showdown

Published

on

Stranger Things 5’s first trailer promises an epic showdown

It’s been a long time coming, but we finally have a real look at the end of Stranger Things. Netflix just released the first teaser trailer for the show’s fifth season, which will also be its last when it starts streaming later this year. As was alluded to in the finale of season 4, the new trailer — which, despite being called a teaser, clocks in at nearly three minutes long — is focused on the major showdown with Vecna that will presumably end the string of supernatural bad luck in Hawkins, Indiana for good.

Here’s the official setup for the finale, according to Netflix:

The fall of 1987. Hawkins is scarred by the opening of the Rifts, and our heroes are united by a single goal: find and kill Vecna. But he has vanished — his whereabouts and plans unknown. Complicating their mission, the government has placed the town under military quarantine and intensified its hunt for Eleven, forcing her back into hiding. As the anniversary of Will’s disappearance approaches, so does a heavy, familiar dread. The final battle is looming — and with it, a darkness more powerful and more deadly than anything they’ve faced before. To end this nightmare, they’ll need everyone — the full party — standing together, one last time.

Continue Reading

Technology

Landline identity theft leads to major bank fraud

Published

on

Landline identity theft leads to major bank fraud

NEWYou can now listen to Fox News articles!

Landline identity theft is an emerging threat that gives scammers backdoor access to your accounts. 

An outdated phone number, especially a forgotten landline, can help them bypass security and drain your savings. 

Here’s how it happens and how to stop it.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.

Advertisement

IS YOUR PHONE HACKED? HOW TO TELL AND WHAT TO DO

A man on a phone call using a landline telephone (Kurt “CyberGuy” Knutsson)

How forgotten landline identity theft drained a bank account

Richard from Reno, Nevada, shared a troubling story. His friend lost money to scammers because their old landline number was still linked to a bank account.

It started with a credit alert asking whether the friend had opened a new card. They said no and thought the issue was resolved.

But soon after, they couldn’t access their bank or investment accounts. Despite having transaction alerts enabled, the money was already gone.

Advertisement

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

The scammer didn’t hack a password. Instead, they used a security loophole, an outdated landline still listed on file.

“My friend had an old but active landline linked to their bank account,” Richard said. “The thief convinced the phone company to port the number to a mobile device. Then they used it to intercept security codes and drain the account.”

The scammer requested a password reset. The bank sent a verification code to the old number, now controlled by the scammer. That code let them change the login, lock the victim out, and move the funds.

Credit monitoring caught the new credit inquiry but failed to detect the fraud inside the existing accounts. By the time access was restored, the money had disappeared.

Advertisement
man shouting

A man screaming into a phone receiver of a landline phone  (Kurt “CyberGuy” Knutsson)

Why landline identity theft is so easy to pull off

This scam highlights how identity thieves evolve. They don’t always need advanced tools. Sometimes, they just use the details you’ve forgotten.

The role of number porting

The attacker used number porting, a process meant to help people keep their number when switching carriers. It’s legitimate, until scammers exploit it.

In this case, the thief pretended to be the victim and asked the phone company to transfer the landline number to a mobile device. Once the number was active, they received calls and texts, including two-factor authentication (2FA) codes.

How old contact info creates new risks

Many people forget to update recovery settings after creating an account. But an outdated phone number or email can still receive security codes. If a scammer gains control of those recovery tools, your accounts are wide open.

Advertisement

The overlooked weaknesses that made this attack work

Even small gaps in your security settings can lead to big problems. These were the key vulnerabilities in this case:

Old phone numbers stay linked too long

Scammers can hijack even inactive numbers through porting. If those numbers still connect to your bank or email, they become an easy target.

Credit monitoring can miss real-time fraud

Tools that monitor new credit accounts won’t always detect unauthorized transactions in your existing bank or investment accounts.

Weak 2FA setups can be hijacked

2FA is helpful, but only when the linked phone number or email is secure. If a scammer controls that method, they can bypass your protections.

phones

An older style landline telephone next to smartphone  (Kurt “CyberGuy” Knutsson)

How to prevent landline identity theft

You can’t stop scammers from trying, but you can make it much harder for them to succeed. Use these steps to reduce your risk.

Advertisement

1. Audit your account recovery options: Check your recovery settings on every important account. Delete old phone numbers or backup emails. Keep only active, secure options on file.

2. Use an authenticator app: Authenticator apps like Google Authenticator, Authy, or Microsoft Authenticator generate one-time login codes on your device. This is safer than relying on text messages, which scammers can intercept.

3. Freeze number porting with your carrier: Contact your phone provider and ask about port-out protection. This feature blocks scammers from transferring your number without extra identity verification like a PIN or in-person request.

4. Remove your info from data broker sites: Scammers gather personal details like old numbers from public broker listings. Use a data removal service to erase this info from the web. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan.

Advertisement

5. Monitor your bank activity directly: Set up alerts through your bank for every transaction. Log in regularly, even if you haven’t received any warnings, to catch fraud faster.

6. Use a password manager: A strong, unique password protects each account. A tool like a password manager creates and stores complex passwords for you. It also tracks password health and alerts you to possible breaches. Get more details about my best expert-reviewed Password Managers of 2025 at Cyberguy.com/Passwords.

7. Consider full identity theft protection: Even with strong passwords and 2FA, your personal info can still be exposed. An identity theft protection service offers dark web monitoring, account alerts, and some offer up to $1 million in identity theft insurance. See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft.

Kurt’s key takeaways

Landline identity theft shows that forgotten account settings can turn into serious threats. Take a few minutes to review your recovery options. Switch to authenticator apps. Set up port-out protection. And don’t rely on credit monitoring alone, it can’t catch everything. These simple steps can help you stay ahead of evolving scams and protect your most important accounts.

Advertisement

Have you experienced a similar scam or spotted a new tactic? Let us know by writing us at Cyberguy.com/Contact.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.

Copyright 2025 CyberGuy.com. All rights reserved.  

Continue Reading

Technology

Analogue’s 4K N64 has been delayed again, but only by a month

Published

on

Analogue’s 4K N64 has been delayed again, but only by a month

The Analogue 3D has been hit with another delay, but should still be launching this summer. In an update on its preorder website, Analogue explained that it’s modern take on the Nintendo 64 “is now shipping in late August 2025,” after previously aiming for July. The company said in a separate statement that the decision was made due to the ever-changing situation around US tariffs.

“Following last week’s sudden tariff changes, Analogue 3D will now begin shipping next month,” the company explained in a post on X. “We’re absorbing the costs — your preorder price stays the same. No additional charges. Late August, the wait ends: reviews go live with everything we’ve been saving for this moment.”

Like its previous hardware, the $249.99 Analogue 3D is a modern console designed to play old games, in this case N64 cartridges. The new console can upscale classic games to 4K and includes multiple display modes to mimic the look and feel of a CRT display, and the company says that it supports 100 percent of N64 cartridges. It was originally planned for a launch in 2024, but has been hit with multiple delays since it was initially announced.

Continue Reading

Trending