The Vo1d botnet, a sophisticated and evolving cyber threat, has compromised 1.6 million Android TV devices across over 200 countries and regions.
This large-scale attack, uncovered by XLab’s Cyber Threat Insight and Analysis System (CTIA), marks one of the largest botnet campaigns targeting smart TVs to date.
The infection was traced back to November 2024, when an ELF downloader named “jddx” was flagged for its unique encryption techniques and connection to the notorious Bigpanzi botnet.
However, deeper analysis revealed it as part of a new variant of the Vo1d botnet, signaling the start of a global campaign.
Scale and Potential Risks
The Vo1d botnet dwarfs previous cyber threats in scale and sophistication.
For comparison:
- The Mirai botnet, which disrupted major internet services in 2016, utilized hundreds of thousands of devices far fewer than Vo1d’s 1.6 million infected devices.
- A 2024 DDoS attack recorded at 5.6 Tbps required only 15,000 devices; Vo1d’s network is over 100 times larger.
Currently, the infected devices are primarily used for profit-driven activities like ad fraud and proxy services.

However, their full control by attackers raises concerns about potential large-scale cyberattacks targeting critical infrastructure such as banking, healthcare, or aviation systems.
Furthermore, compromised Android TVs could be exploited to broadcast unauthorized or harmful content, including political propaganda or deepfake videos, as demonstrated in real-world incidents like the February 2025 hacking of U.S. Department of Housing and Urban Development televisions.
Technical Advancements in Vo1d
Vo1d employs advanced techniques to enhance its stealth and resilience:
- Encryption: RSA encryption secures communication between infected devices and command-and-control (C2) servers, preventing hijacking even if domains are preemptively registered by researchers.
- Dynamic Infrastructure: The botnet uses Domain Generation Algorithms (DGA) to create thousands of domains for C2 communication, coupled with hardcoded redirector servers for added flexibility.
- Payload Delivery: Each payload is uniquely encrypted with XXTEA and RSA-protected keys, complicating analysis efforts.
The botnet’s infrastructure includes over 21 C2 domains and generates more than 100,000 DGA domains to evade detection.

Additionally, its infection hotspots have shifted dramatically over time; India recently surged to second place in infection rates globally.
Operational Insights
Analysis of captured payloads reveals that Vo1d focuses on building anonymous proxy networks using infected devices a lucrative business model that has previously generated millions in illicit profits for similar operations.
Other activities include ad fraud and traffic inflation through modular malware components like DexLoaders and plugins such as “Popa” (proxy services) and “Spirit” (ad promotion).
According to XLab, these components demonstrate the group’s technical expertise in developing scalable malware ecosystems.
The Vo1d botnet’s unprecedented scale and continuous evolution pose significant challenges to global cybersecurity efforts.
Its ability to operate undetected for months highlights gaps in current defenses against IoT-targeted malware.
As law enforcement agencies ramp up their crackdown on cybercrime, researchers emphasize the need for collaboration to mitigate this growing threat effectively.