A new variant of the Vo1d malware botnet has become one of the largest seen in recent years, infecting over 1.5 million Android TV devices across 226 countries. As of February 2025, the botnet continues to grow with nearly 800,000 active bots. The botnet operates by turning compromised devices into proxy servers, masking the origin of cybercriminal activities. Researchers at Xlab have been tracking this new variant since November 2024 and have noted significant infection surges, especially in countries like Brazil, South Africa, and Indonesia.
The Vo1d botnet operates with enhanced encryption and stealth techniques, using advanced RSA and custom XXTEA encryption, along with a resilient domain generation algorithm (DGA) infrastructure.
This complex structure is designed to evade detection by researchers and security tools. The botnet’s command and control network relies on over 21,000 C2 domains and is protected by 2048-bit RSA encryption, making it incredibly difficult to disrupt. Vo1d’s size and capabilities have surpassed other major botnets in recent history, such as Bigpanzi and Mirai, both known for carrying out significant DDoS attacks.
The botnet’s operations also involve a “rental-return” system, where devices are leased to other cybercriminal groups for their activities, leading to rapid surges and declines in the infection count.
Researchers speculate that this leasing mechanism allows Vo1d operators to maximize the use of their botnet infrastructure while minimizing detection. This cyclical pattern of infections and removals helps maintain the botnet’s stealth and effectiveness, ensuring its continued growth and use in cybercrime operations. The botnet primarily facilitates illegal operations such as ad fraud, where compromised devices simulate user interactions to generate revenue for fraudsters.
To combat the growing threat of Vo1d, researchers have advised Android TV users to adopt a holistic security approach. This includes purchasing devices from reputable vendors, installing firmware updates, avoiding third-party app downloads, and disabling remote access features on devices not in use. Researchers also suggest isolating IoT devices from valuable systems that hold sensitive data to limit the potential damage from infections. These steps are critical in preventing future infections and minimizing the risk of becoming part of the expanding Vo1d botnet.