Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

China criticizes the US ban on Harvard international students

Why the Event Industry Doesn’t Support DEI

Fast delivery of medical technology for emergencies

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » VO1D BOTNET peaks outweigh 1.59m infected Android TVS across 226 countries
Identity

VO1D BOTNET peaks outweigh 1.59m infected Android TVS across 226 countries

userBy userMarch 3, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 3, 2025Ravi LakshmananMobile Security/Botnet

VO1D Botnet

Brazil, South Africa, Indonesia, Argentina and Thailand are targeting campaigns that have infected Android TV devices with botnet malware called VO1D.

The improved variant of VO1D is known to include 800,000 active IP addresses daily, with botnets scaling a peak of 1,590,299 on January 19, 2025. As of February 25, 2025, India had experienced a significant surge in infection rates, rising to below 1% (3,901) (217,771).

“VO1D has evolved to increase stealth, resilience and prevention capabilities,” Qianxin XLAB said. “RSA encryption protects and prevents network communications [command-and-control] Even if it’s a takeover [the Domain Generation Algorithm] The domain is registered by the researcher. Each payload uses a unique downloader with XXTEA encryption and RSA protection keys to make analysis difficult. ”

Cybersecurity

It was first documented by Doctor Web that the malware would affect Android-based TV boxes in September 2024, using a backdoor that allows you to download additional executables based on instructions issued by the Command and Control (C2) server.

It is not clear how the compromise will occur, but it is suspected to include the type of supply chain attack and the use of an unofficial firmware version with built-in root access.

At the time, Google told Hacker News that the infected “unbranded” TV models were not playing Protect-certified Android devices and likely used the source code from the Android Open Source Project (AOSP) code repository.

VO1D Botnet

The latest iterations of malware campaigns show that they are operating at scale with intent to facilitate the creation of proxy networks and to promote activities such as ad click fraud.

XLAB theorized that rapid fluctuations in botnet activity are caused by the bot being leased for a set period of time, allowing illegal operations and joining a larger VO1D network, as part of the “rental return” cycle, as its infrastructure is leased to other criminals, as it is leased to a set period of time, allowing for illegal operations.

Analysis of a new version of ELF malware (S63) reveals that it is designed to download, decrypt and run the second stage payload, which is responsible for establishing communication with the C2 server.

The decrypted compressed package (TS01) contains four files: install.sh, cv, vo1d, and x.apk. This starts with a shell script that launches the CV component and launches both the VO1D and the Android app after installation.

The main function of the VO1D module is to establish communication with the C2 server and decrypt and load the embedded payload, a backdoor that allows you to download and run native libraries.

VO1D Botnet

“That core functionality remains the same,” Xlab said. “However, we have received significant updates to our network communication mechanisms, particularly implementing Redirector C2. Redirector C2 provides bots with real C2 server addresses and leverages a large pool of domains generated by hardcoded redirector C2 and DGA to build a vast network architecture.”

For that part, the package name “com.google.android.gms.stable” for malicious Android apps is a clear attempt to fly a legitimate Google Play service (“com.google.android.gms”) under radar. Listening for the “boot_completed” event will set host persistence and run automatically after each reboot.

Cybersecurity

It is also designed to launch two other components that have similar functionality to the VO1D module. The attack chain paves the way for the deployment of modular Android malware named Mzmess built into four different plugins –

Popa (“com.app.mz.popan”) and jaguar (“com.app.mz.jaguarn”) proxy services lxhwdg (“com.app.mz.lxhwdgn”).

The lack of infrastructure duplication between MZMESS and VO1D has increased the likelihood that the threat behind malicious activities is renting services to other groups.

“Currently, VO1D is used for profit, but with full control of the device, attackers can challenge large-scale cyberattacks and other criminal activities. [such as distributed denial-of-service (DDoS) attacks]”Xlab said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTake: Syrian TV drama during Ramadan after Assad | News
Next Article A new era for astroparticle physics research in Europe
user
  • Website

Related Posts

US dismantles Danabot malware network and charges 16 for $50 million global cybercrime operation

May 23, 2025

CISA warns that there are widespread suspected SaaS attacks that exploit app secrets and cloud Misconfig

May 23, 2025

A vulnerability in the Gitlab duo allowed attackers to hijack AI responses with hidden prompts

May 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

China criticizes the US ban on Harvard international students

Why the Event Industry Doesn’t Support DEI

Fast delivery of medical technology for emergencies

Lithium-Co₂ Battery Surrey University Breakthrough Offers the Dual Benefits of Energy Storage and Carbon Capture

Trending Posts

EU membership, seizing Russian money needed to rebuild Ukraine: Analysts | News of the Russian-Ukraine War

May 23, 2025

US sanctions after dominating chemical weapons used during the Civil War | Sudan War News

May 23, 2025

Thunder-wolves 118-103: MVP SGA Sets Up 2-0 NBA West Final Lead | Basketball News

May 23, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

B2Broker launches its first turnkey liquidity provider solution

DiffusedRive raises $3.5 million to solve the biggest challenges of physical AI: high quality training data

Top Startup and Tech Funding News – May 22, 2025

Apple, who will launch smart glasses in 2026 as part of API push, drops plans for camera-equipped smartwatch

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.