Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The UK is set up to provide solutions to AI and copyright issues

Chinese hackers target cobalt strikes and custom backdoors in Taiwan’s semiconductor sector

UK launches electric vehicle grants to enable green transitions

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » VO1D BOTNET peaks outweigh 1.59m infected Android TVS across 226 countries
Identity

VO1D BOTNET peaks outweigh 1.59m infected Android TVS across 226 countries

userBy userMarch 3, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 3, 2025Ravi LakshmananMobile Security/Botnet

VO1D Botnet

Brazil, South Africa, Indonesia, Argentina and Thailand are targeting campaigns that have infected Android TV devices with botnet malware called VO1D.

The improved variant of VO1D is known to include 800,000 active IP addresses daily, with botnets scaling a peak of 1,590,299 on January 19, 2025. As of February 25, 2025, India had experienced a significant surge in infection rates, rising to below 1% (3,901) (217,771).

“VO1D has evolved to increase stealth, resilience and prevention capabilities,” Qianxin XLAB said. “RSA encryption protects and prevents network communications [command-and-control] Even if it’s a takeover [the Domain Generation Algorithm] The domain is registered by the researcher. Each payload uses a unique downloader with XXTEA encryption and RSA protection keys to make analysis difficult. ”

Cybersecurity

It was first documented by Doctor Web that the malware would affect Android-based TV boxes in September 2024, using a backdoor that allows you to download additional executables based on instructions issued by the Command and Control (C2) server.

It is not clear how the compromise will occur, but it is suspected to include the type of supply chain attack and the use of an unofficial firmware version with built-in root access.

At the time, Google told Hacker News that the infected “unbranded” TV models were not playing Protect-certified Android devices and likely used the source code from the Android Open Source Project (AOSP) code repository.

VO1D Botnet

The latest iterations of malware campaigns show that they are operating at scale with intent to facilitate the creation of proxy networks and to promote activities such as ad click fraud.

XLAB theorized that rapid fluctuations in botnet activity are caused by the bot being leased for a set period of time, allowing illegal operations and joining a larger VO1D network, as part of the “rental return” cycle, as its infrastructure is leased to other criminals, as it is leased to a set period of time, allowing for illegal operations.

Analysis of a new version of ELF malware (S63) reveals that it is designed to download, decrypt and run the second stage payload, which is responsible for establishing communication with the C2 server.

The decrypted compressed package (TS01) contains four files: install.sh, cv, vo1d, and x.apk. This starts with a shell script that launches the CV component and launches both the VO1D and the Android app after installation.

The main function of the VO1D module is to establish communication with the C2 server and decrypt and load the embedded payload, a backdoor that allows you to download and run native libraries.

VO1D Botnet

“That core functionality remains the same,” Xlab said. “However, we have received significant updates to our network communication mechanisms, particularly implementing Redirector C2. Redirector C2 provides bots with real C2 server addresses and leverages a large pool of domains generated by hardcoded redirector C2 and DGA to build a vast network architecture.”

For that part, the package name “com.google.android.gms.stable” for malicious Android apps is a clear attempt to fly a legitimate Google Play service (“com.google.android.gms”) under radar. Listening for the “boot_completed” event will set host persistence and run automatically after each reboot.

Cybersecurity

It is also designed to launch two other components that have similar functionality to the VO1D module. The attack chain paves the way for the deployment of modular Android malware named Mzmess built into four different plugins –

Popa (“com.app.mz.popan”) and jaguar (“com.app.mz.jaguarn”) proxy services lxhwdg (“com.app.mz.lxhwdgn”).

The lack of infrastructure duplication between MZMESS and VO1D has increased the likelihood that the threat behind malicious activities is renting services to other groups.

“Currently, VO1D is used for profit, but with full control of the device, attackers can challenge large-scale cyberattacks and other criminal activities. [such as distributed denial-of-service (DDoS) attacks]”Xlab said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTake: Syrian TV drama during Ramadan after Assad | News
Next Article A new era for astroparticle physics research in Europe
user
  • Website

Related Posts

Chinese hackers target cobalt strikes and custom backdoors in Taiwan’s semiconductor sector

July 17, 2025

Cisco warns of critical ISE flaws, allowing uncertified attackers to run route code

July 17, 2025

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

July 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The UK is set up to provide solutions to AI and copyright issues

Chinese hackers target cobalt strikes and custom backdoors in Taiwan’s semiconductor sector

UK launches electric vehicle grants to enable green transitions

Cisco warns of critical ISE flaws, allowing uncertified attackers to run route code

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.