Threat Feed

10.03.25 Threat Report

Written by Craig Pepper | Mar 10, 2025 9:54:41 AM

This week, a large-scale Android malware campaign affecting millions of devices, a malvertising attack infecting over a million users, and the emergence of weaponised Go packages targeting Linux and macOS. 

1. Millions of Android Devices Infected with Hidden Backdoor for Cybercrime

Millions of Android-powered devices, including TV streaming boxes, tablets, and car infotainment systems. Cyber security researchers at Human Security revealed that a large number of these devices are preloaded with malware that covertly turns them into botnet nodes—allowing cybercriminals to commit ad fraud, data theft, and other online crimes without the owners’ knowledge.

The latest campaign, Badbox 2.0, builds on previous findings, showing that the ecosystem behind these compromised devices is far larger than initially believed.

Attack Details:

  • Pre-Installed Malware – Malicious firmware is embedded into devices before sale, turning them into botnet nodes.
  • Fake App Distribution – Attackers distribute counterfeit versions of popular apps to install malware and expand their control.
  • Drive-By Downloads – Users unknowingly download additional malware when browsing compromised websites.
  • Exploitation of Non-Google Devices – Many of these Android devices lack Google’s security protections, making them prime targets.

Potential Impact:

  • Botnet Expansion: Infected devices are used for ad fraud, distributed denial-of-service (DDoS) attacks, and credential theft.
  • User Privacy Risks: Personal data can be exfiltrated from compromised devices without user consent.
  • Global Cybercrime Facilitation: Many of these devices are being leveraged to hide illicit internet activity, with a high concentration of victims in South America, particularly Brazil.

Recommendation:

Avoid Low-Cost, No-Name Android Devices – Be cautious when purchasing inexpensive Android-powered gadgets, as they may come pre-infected.
Verify App Authenticity – Only download apps from official app stores, such as Google Play, and check developer credentials.
Monitor Network Traffic – Businesses should implement monitoring tools to detect unusual traffic patterns from connected devices.
Use Security Solutions – Install endpoint protection software to detect and remove suspicious applications.

2. Malvertising Campaign Infects Over One Million Devices Worldwide

Microsoft has disclosed details of a large-scale malvertising campaign that has impacted over one million devices globally. This opportunistic attack is designed to steal sensitive information from affected systems. 

Attack Details:

  • Malicious Advertisements – Attackers placed ads on illegal streaming sites, leading users to exploit-laden pages.
  • Abuse of Legitimate Platforms – Malware was hosted on GitHub to bypass traditional security measures.
  • User Manipulation – Social engineering tactics tricked victims into downloading harmful software.

Potential Impact:

  • Data Theft: Users risk exposure of financial and personal data.
  • System Compromise: Malicious software can grant remote control to cybercriminals.
  • Reputational Damage: Affected organisations may face customer distrust and regulatory scrutiny.

Recommendation:

Avoid Untrusted Websites – Do not visit illegal streaming or torrent sites that commonly distribute malvertising.
Use Ad Blockers – Deploy ad-blocking software to mitigate exposure to harmful ads.
Regularly Update Software – Ensure browsers, antivirus, and operating systems are fully patched to prevent exploitation.

 

3. Weaponised Go Packages Targeting Linux and macOS Systems

There is an ongoing malicious campaign targeting the Go programming language ecosystem. Attackers have introduced seven typosquatted packages designed to install hidden loader malware on Linux and macOS systems. 

Attack Details:

  • Typosquatting: Attackers created fake Go packages with nearly identical names to popular libraries.
  • Malicious Code Execution: Once installed, these packages deploy hidden loaders to execute arbitrary code.

Potential Impact:

  • Unauthorised Access: Developers may unknowingly install backdoors in their environments.
  • Data Breach: Sensitive credentials or files may be stolen.
  • Supply Chain Risks: Malicious code could propagate to downstream applications.

Recommendation:

Verify Dependencies – Always double-check package sources before integrating them into projects.
Conduct Code Reviews – Regularly audit dependencies for suspicious code.
Utilise Security Tools – Implement security scanners to detect tampered or malicious packages.

 

Stay ahead of emerging cyber threats with real-time insights from Periculo’s Weekly Threat Feed. Our updates provide you with critical information on the latest vulnerabilities, attacks, and security trends—all designed to help you protect your business and make informed decisions.