
Over 10 million Android users told to turn off devices after Google exposes ‘infection' – exact list of models affected
As many as 10 million devices have been affected, according to a recent security warning from Google.
3
TV set-top boxes, tablets and digital projectors being made in China have been found to be either susceptible to a malware known as BadBox 2.0, or have it already downloaded by the time it is shipped.
BadBox targets Android devices and has been found inside 24 apps on the Google Play Store, security researchers at MalwareBytes have said.
While those apps, and several BadBox servers, were removed as of March 2025, it remains one of the biggest malware threats to internet-connected TVs.
The minute consumers set up the device, they open up a backdoor for criminals to access other devices in their home network.
Cyber criminals gain access either by installing malicious software prior to the users purchase, or infecting the device as it downloads required applications during the set-up process.
Badbox can run advertising fraud, as well as more worrying attacks, such as ransomware, where users are often asked to pay a fee to stop data being leaked.
In its security warning, Google wrote: "The BadBox 2.0 botnet compromised over 10 million uncertified devices running Android's open-source software (Android Open Source Project), which lacks Google's security protections.
3
"Cyber criminals infected these devices with preinstalled malware and exploited them to conduct large-scale ad fraud and other digital crimes."
The tech giant has now filed a lawsuit in the New York federal court against the crooks behind BadBox.
Some of the known devices that have been infected include Android TV boxes with model numbers X88 Pro 10, T95, MXQ Pro, and QPLOVE Q9.
It's unclear if these are the only affected TV boxes.
Though tablets and digital projectors with unknown model numbers are still reportedly affected.
If you think you have purchased a cheap Android-powered set-top box - especially one mentioned above - it's important to check if it Google Play Protect-certified.
Google Play Protect is Android's built-in malware and unwanted software protection, which the tech company has updated to automatically block BadBox-infected apps.
"While these actions kept our users and partners safe," according to Google. "This lawsuit enables us to further dismantle the criminal operation behind the botnet, cutting off their ability to commit more crime and fraud."
The FBI has also issued an alert about the BadBox malware campaign, saying there may be more gadgets affected.
"Cyber criminals gain unauthorised access to home networks through compromised IoT (internet of things) devices," the FBI wrote in an alert. "Such as TV streaming devices, digital projectors, aftermarket vehicle infotainment systems, digital picture frames and other products."
WHAT TO LOOK OUT FOR
There are six signs that your digital gadgets may have been infected with BadBox 2.0 malware, according to the FBI:
Possible indicators of BadBox 2.0 botnet activity include:
The presence of suspicious marketplaces where apps are downloaded.
Requiring Google Play protect settings to be disabled.
Generic TV streaming devices advertised as unlocked or capable of accessing free content.
IoT devices advertised from unrecognizable brands.
Android devices that are not Play Protect certified.
Unexplained or suspicious Internet traffic.
Image credit: Getty
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Reuters
9 minutes ago
- Reuters
Women's dating app Tea reports 72,000 images stolen in security breach
July 26 (Reuters) - Tea, an app that lets women anonymously comment and review dates with men, said, opens new tabit has suffered a data breach, with hackers gaining access to 72,000 user images. A Tea spokesperson confirmed the hack to Reuters on Saturday, saying they had detected "unauthorized access to our systems" and about 72,000 images had been exposed, including 13,000 selfies and photo identifications submitted for account verification purposes, as well as 59,000 images from posts, comments, and direct messages. "We have engaged third-party cybersecurity experts and are working around the clock to secure our systems," the company said in a statement, adding that no emails or phone numbers were exposed, and that only users who signed up before February 2024 were affected. The breach was first reported, opens new tab by 404 Media early on Friday. The app, which says its motto is "women should never have to compromise their safety while dating," is a platform where women who sign up and are approved after a verification process can anonymously share information about men they are interested in in Yelp-style reviews. It has gained increasing popularity, saying on Instagram that more than two million users in the past few days had asked to join the app. Signing up for Tea requires users to take selfies, which the app says are deleted, opens new tab after review.


The Independent
an hour ago
- The Independent
The Tea app was intended to help women date safely. Then it got hacked
Tea, a provocative dating app designed to let women anonymously ask or warn each other about men they'd encountered, rocketed to the top spot on the U.S. Apple App Store this week. On Friday, the company behind the app confirmed it had been hacked: Thousands of images, including selfies, were leaked online. 'We have engaged third-party cybersecurity experts and are working around the clock to secure our systems,' San Francisco-based Tea Dating Advice Inc. said in a statement. The app and the breach highlight the fraught nature of seeking romance in the age of social media. Here's what to know: Tea founder Sean Cook, a software engineer who previously worked at Salesforce and Shutterfly, says on the app's website that he founded the company in 2022 after witnessing his own mother's 'terrifying'' experiences. Cook said they included unknowingly dating men with criminal records and being 'catfished'' — deceived by men using false identities. Tea markets itself as a safe way for women to anonymously vet men they might meet on dating apps such as Tinder or Bumble — ensuring that the men are who they say they are, not criminals and not already married or in a relationship. It's been compared to the Yelp of dating. In an Apple Store review, one woman wrote that she used a Tea search to investigate a man she'd begun talking to and discovered 'over 20 red flags, including serious allegations like assault and recording women without their consent.'' She said she cut off communication. 'I can't imagine how things could've gone had I not known," she wrote. A surge in social media attention over the past week pushed Tea to the No. 1 spot at the U.S. Apple Store as of July 24, according to Sensor Tower, a research firm. In the seven days from July 17-23, Tea downloads shot up 525% compared to the week before. Tea said in an Instagram post that it had reached 4 million users. Tea has been criticized for invading men's privacy A female columnist for The Times of London newspaper, who signed into the app, on Thursday called Tea a 'man-shaming site'' and complained that 'this is simply vigilante justice, entirely reliant on the scruples of anonymous women. With Tea on the scene, what man would ever dare date a woman again?'' It's unclear what legal recourse an aggrieved man might have if he feels he's been defamed or had his privacy violated on Tea or a similar social media platform. In May, a federal judge in Illinois threw out an invasion-of-privacy lawsuit by a man who'd been criticized by women in the Facebook chat group "Are We Dating the Same Guy,'' Bloomberg Law reported. The breach exposed thousands of selfies and photo IDs In its statement, Tea reported that about 72,000 images were leaked online, including 13,000 images of selfies or photo identification that users submitted during account verification. Another 59,000 images that were publicly viewable in the app from posts, comments and direct messages were also accessed, according to the company's statement. No email addresses or phone numbers were exposed, the company said, and the breach only affects users who signed up before February 2024. 'At this time, there is no evidence to suggest that additional user data was affected. Protecting tea users' privacy and data is our highest priority,' Tea said. It said users did not need to change their passwords or delete their accounts. "All data has been secured.'' .


Reuters
4 hours ago
- Reuters
WeRide receives permit for robotaxis in Shanghai
July 26 (Reuters) - Chinese autonomous driving technology company WeRide (WRD.O), opens new tab said on Saturday it has been granted a permit from the Shanghai municipal government to operate autonomous robotaxi ride-hailing services. WeRide, in partnership with Chery Group and Jinjiang Taxi, will deploy fully driverless ride-hailing robotaxis on public roads in the Pudong New Area, the company said in a statement.