Threat Intelligence

Trojanized Apps: How Malicious SDKs Build Proxy Botnets

Mubeen TeamFebruary 3, 20266 min read

In the palm of your hand lies the most coveted tool for modern cybercriminals. It isn't your banking password (though they want that, too) — it's your IP address.

While mobile devices are designed for communication, the underground economy has repurposed them as "exit nodes" for residential proxy networks. By embedding malicious code into innocent-looking apps, flashlight utilities, and free VPNs, criminal syndicates turn millions of smartphones into a global botnet. This infrastructure is then sold to the highest bidder to commit ad fraud, launch DDoS attacks, or bypass banking security filters.

The most alarming part? You probably won't know it's happening until your data cap is hit or your battery dies halfway through the day.

The SDK Trap: Monetization at a Cost

The primary mechanism for this large-scale hijacking is the Software Development Kit (SDK). App developers, struggling to make a profit in crowded app stores, are approached by proxy companies with a tempting offer: "Include our code in your app, and we'll pay you a monthly fee based on your active user base."

For the developer, it's passive income. For the proxy provider, it's instant access to millions of residential IP addresses.

How the Trojan Horse Works

Once the SDK is integrated, the app functions normally for the user. However, in the background, the device begins reaching out to a Command and Control (C2) server.

1

Integration

Developer adds a monetization SDK (e.g., PacketSDK, HexSDK) to a free VPN or game app.

2

Distribution

User downloads the app from Google Play or a third-party store.

3

Activation

The SDK silently enrolls the device in a proxy pool, sending diagnostic info (OS version, battery level) to the network's controller.

4

Exploitation

Criminals rent the device's IP to mask their location during cyberattacks — from web scraping to credential stuffing.

The "Gray" vs. "Black" Market

Not all proxyware is explicitly illegal, but the line is intentionally blurred.

  • The "Ethical" Tier — apps like Pawns.app or EarnApp explicitly tell users: "Share your internet and get paid." Users opt in, though they rarely understand their connection might be used for credential stuffing
  • The Malicious Tier — SDKs like PacketSDK, HexSDK, or CastarSDK are hidden inside apps without clear disclosure. Research has linked these specific SDKs to massive proxy infrastructures recently disrupted by law enforcement
Feature
Legitimate Proxyware
Malicious SDKs
User Consent
Explicit opt-in
Buried in ToS or non-existent
Visibility
Dashboard showing earnings
Silent background process
Distribution
Official websites
Bundled in pirated games/VPNs
Examples
Pawns.app, Honeygain
GoldFactory, PacketSDK, BadBox

The Rise of GoldFactory: A Double Threat

The threat landscape escalated sharply with the discovery of GoldFactory, a sophisticated malware family responsible for banking trojans like GoldDigger and GoldPickaxe. Active primarily in Southeast Asia, GoldFactory represents a terrifying convergence of fraud and infrastructure.

These trojans do not just steal data — they weaponize the device:

  • Identity Theft — they capture facial recognition data to create deepfakes, bypassing biometric KYC checks at banks
  • Proxy Functionality — simultaneously, the malware converts the infected phone into a proxy node, allowing the attacker to route fraudulent bank transfers through the victim's own device

To the bank's fraud detection system, a GoldFactory-routed request comes from the customer's trusted phone and IP address — rendering velocity checks and device intelligence based on IP alone completely useless.

Supply Chain Nightmares: Pre-Infected Devices

Perhaps the most insidious vector is the hardware supply chain. Security researchers have discovered millions of low-cost Android TV boxes and smartphones that ship with proxy backdoors pre-installed at the factory.

19M+
Zombie Devices
In a single pre-installed botnet
Millions
Cheap Android Boxes
Sold with backdoors on major platforms
Day 0
Time to Compromise
Infected the moment Wi-Fi connects

Known as the BadBox botnet, these devices are sold on major e-commerce platforms. The moment the user connects them to Wi-Fi, they connect to a C2 server and begin selling the home's bandwidth. This creates a "residential" proxy network actually composed of zombie IoT devices — difficult for the average user to detect or clean.

Detection: Is Your Phone a Zombie?

Detecting these infections is difficult because they are designed to be "low and slow" to avoid alerting the user. However, there are tell-tale signs.

Red flags of proxy infection: unexplained battery drain from constant background network activity, sudden spikes in data consumption even when idle, device overheating from processing network requests, and streaming or gaming lag because your bandwidth is being rented out.

Google and other tech giants are fighting back. Initiatives like Google Play Protect now scan for known malicious SDKs and automatically remove them. Legal actions have been taken to seize domains associated with major proxy botnets.

For organizations, combining behavioral biometrics with network fingerprinting through a real-time risk engine can detect traffic routed through compromised mobile devices — even when the IP address appears completely legitimate. Monitoring for bot-like patterns across login and transaction flows adds another critical layer of defense.

Key Takeaways

  • Malicious SDKs hidden in free apps silently convert millions of phones into residential proxy exit nodes
  • The line between "legitimate" proxyware and criminal infrastructure is intentionally blurred by proxy providers
  • GoldFactory-style trojans combine identity theft with proxy functionality, routing fraud through the victim's own device
  • Pre-infected hardware in the supply chain creates zombie botnets that activate the moment they connect to Wi-Fi
  • Detection requires looking beyond IP reputation to behavioral signals like battery drain, data spikes, and network-level fingerprinting

The mobile device has become the new frontline for cybercrime infrastructure. Whether through a "free" VPN that quietly sells your bandwidth or a sophisticated banking trojan that steals your face and your IP address simultaneously, the threat is ubiquitous. If an app is free, you — or your internet connection — are likely the product.

malicious SDKs
mobile security
residential proxies
supply chain attacks
bot detection