FBI Warns of Malware Preinstalled on Low-Cost Android Devices

Image by Pexels

This post is also available in: עברית (Hebrew)

Millions of Android devices around the world have been compromised by a preinstalled malware strain known as BadBox 2.0, according to a recent warning from the FBI. This latest variant, embedded in inexpensive Android-based products such as TV streaming devices, digital projectors, aftermarket vehicle infotainment systems, digital picture frames and more, which are primarily manufactured in China and distributed globally.

Unlike traditional malware infections that require users to install malicious software, BadBox 2.0 is factory-installed. Once such a device connects to a home network, it immediately becomes part of a larger botnet operation, allowing cybercriminals to exploit it for various illicit purposes—including using it as a residential proxy to mask illegal internet activity.

The malware opens persistent backdoors on compromised devices, enabling attackers to install additional malicious payloads. These infected devices can then be used to carry out illegal activities, conducting cyberattacks or distributing fraudulent ads —all without the user’s knowledge.

Key indicators of infection include unexpected spikes in data traffic, unexplained background processes, and devices prompting users to disable Google Play Protect. Users are also warned to be cautious of Android devices from obscure brands or those that advertise features such as “unlocked” content or free streaming capabilities.

Unfortunately, once infected, removing BadBox 2.0 is not straightforward. It requires advanced firmware reflashing, which is beyond the capability of most consumers. The FBI recommends disconnecting suspicious devices from home networks and considering full replacement of the device if infection is suspected.

To minimize risk, users should avoid downloading apps from unverified sources and be wary of non-certified Android devices. Monitoring network activity and keeping all IoT devices up to date is critical in preventing unauthorized access through compromised hardware.