Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

Bigpanzi Infected 100K+ Android TVs

January 18, 2024
Reading Time: 3 mins read
in Incidents

A clandestine cybercrime syndicate known as ‘Bigpanzi’ has been silently profiting since 2015 by infecting Android TV and eCos set-top boxes globally. Researchers from Beijing-based Qianxin Xlabs revealed that Bigpanzi manages a vast botnet, with approximately 170,000 daily active bots. However, since August, they’ve observed 1.3 million unique IP addresses associated with the botnet, primarily in Brazil. Bigpanzi employs custom malware like ‘pandoraspear’ and ‘pcdn’ to infect devices, turning them into nodes for illegal media streaming, traffic proxying, DDoS attacks, and over-the-top (OTT) content provision.

The malware ‘pandoraspear’ serves as a backdoor trojan, hijacking DNS settings, establishing command and control (C2) communication, and executing commands from the C2 server. It supports various commands for manipulating DNS settings, initiating DDoS attacks, self-updating, creating reverse shells, managing C2 communication, and executing arbitrary OS commands. To evade detection, ‘pandoraspear’ employs sophisticated techniques such as a modified UPX shell, dynamic linking, OLLVM compilation, and anti-debugging mechanisms. Additionally, ‘pcdn’ is utilized to construct a peer-to-peer (P2P) Content Distribution Network (CDN) on infected devices, coupled with DDoS capabilities to weaponize them.

Xlabs gained insights into the botnet’s scale by hijacking two C2 domains used by Bigpanzi and conducting a seven-day observation. The researchers found that the botnet has 170,000 daily bots at peak times, with over 1.3 million distinct IPs observed since August. Despite the covert nature of Bigpanzi’s operations, researchers warn that their findings only scratch the surface, indicating a much larger and intricate network. The report has not disclosed attribution details, leaving it to relevant law enforcement authorities to address the issue.

 

Reference:
  • Bigpanzi Exposed: The Hidden Cyber Threat Behind Your Set-Top Box
Tags: AndroidBackdoorsBigpanziBotnetsBrazilCyber AttacksCyber Incidents 2024cyber-incidentcybercrimesJanuary 2024pandoraspear
ADVERTISEMENT

Related Posts

Hackers Target Oracle Apps For Extortion

Hackers Target Oracle Apps For Extortion

October 3, 2025
Hackers Target Oracle Apps For Extortion

Hospital Cyberattack Leaks Patient Data

October 3, 2025
Hackers Target Oracle Apps For Extortion

UK Renault Dacia Customer Data Stolen

October 3, 2025
Smishing targets routers in Belgium 2025

Dealership Software Breach Hits 766k

October 2, 2025
Smishing targets routers in Belgium 2025

Allianz Life July Breach Hits 1.5M

October 2, 2025
Smishing targets routers in Belgium 2025

Suffolk Website Down After Cyber-Attack

October 2, 2025

Latest Alerts

Facebook Scams Target Seniors With Malware

Android Spyware Poses As Signal And Totok

Chrome Update Fixes 21 Security Flaws

Outlook Bug Causes Repeated Crashes

Smishing targets routers in Belgium 2025

MatrixPDF Toolkit Turns PDFs Into Lures

Subscribe to our newsletter

    Latest Incidents

    Hackers Target Oracle Apps For Extortion

    Hospital Cyberattack Leaks Patient Data

    UK Renault Dacia Customer Data Stolen

    Allianz Life July Breach Hits 1.5M

    Dealership Software Breach Hits 766k

    Suffolk Website Down After Cyber-Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial