web analytics

Bigpanzi botnet infects 170,000 Android TV boxes with malware – Source: www.bleepingcomputer.com

Rate this post

Source: www.bleepingcomputer.com – Author: Bill Toulas

TV bot

A previously unknown cybercrime syndicate named ‘Bigpanzi’ has been making significant money by infecting Android TV and eCos set-top boxes worldwide since at least 2015.

Beijing-based Qianxin Xlabs reports that the threat group controls a large-scale botnet of approximately 170,000 daily active bots. However, the researchers have seen 1.3 million unique IP addresses associated with the botnet since August, most in Brazil.

Bigpanzi infects the devices via firmware updates or backdoored apps the users are tricked into installing themselves, as highlighted in a September 2023 report by Dr. Web.

Malicious apps carrying malware payloads
Malicious apps carrying malware payloads

Source: Xlabs

The cybercriminals monetize these infections by turning the devices into nodes for illegal media streaming platforms, traffic proxying networks, distributed denial of service (DDoS) swarms, and OTT content provision.

Bigpanzi operations diagram
Bigpanzi operations diagram

Source: Xlabs

Bigpanzi’s custom malware

Xlabs’ report focuses on ‘pandoraspear’ and ‘pcdn,’ two malware tools used by Bigpanzi in their operations.

The two malware payloads on the malicious firmware image
The two malware payloads on the malicious firmware image

Source: Xlabs

Pandoraspear acts as a backdoor trojan, hijacking DNS settings, establishing command and control (C2) communication, and executing commands received from the C2 server.

The malware supports a variety of commands that allow it to manipulate DNS settings, initiate DDoS attacks, update itself, create reverse shells, manage its communication with the C2, and execute arbitrary OS commands.

Establishing a reverse-shell on an infected device
Establishing a reverse-shell on an infected device

Source: Xlabs

Pandoraspear uses sophisticated techniques like modified UPX shell, dynamic linking, OLLVM compilation, and anti-debugging mechanisms to evade detection.

Pcdn is used to build a peer-to-peer (P2P) Content Distribution Network (CDN) on infected devices and possesses DDoS capabilities to weaponize devices.

Pcdn's built-in DDoS toolset
Pcdn’s built-in DDoS toolset

Source: Xlabs

Scale of operations

Xlabs gained insight into the botnet’s scale after hijacking two C2 domains used by the attackers and conducting a seven-day observation.

The analysts report that the Bigpanzi botnet has 170,000 daily bots at peak times and has observed over 1.3 million distinct IPs since August.

Over 1.3 million nodes detected in Brazil
Over 1.3 million nodes detected in Brazil

Source: Xlabs

However, due to the compromised TV boxes not being simultaneously active at all times and the cybersecurity analysts’ visibility limitations, it is considered inevitable that the botnet’s size is larger.

“Over the past eight years, Bigpanzi has been operating covertly, silently amassing wealth from the shadows,” reads the Xlabs report.

“With the progression of their operations, there has been a significant proliferation of samples, domain names, and IP addresses.”

“In the face of such a large and intricate network, our findings represent just the tip of the iceberg in terms of what Bigpanzi encompasses.”

Artifacts in the analyzed pcdn sample have led the Chinese researchers to a suspicious YouTube channel controlled by a company.

However, the Xlabs report has not disclosed any attribution details yet, presumably reserving those for the applicable law enforcement authorities.

Original Post URL: https://www.bleepingcomputer.com/news/security/bigpanzi-botnet-infects-170-000-android-tv-boxes-with-malware/

Category & Tags: Security – Security

Views: 0

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post