Following BadBox 2.0 Artifacts: The Zhu Zhiyu Trail
![]() |
In early 2026, widespread reporting brought renewed attention to BadBox 2.0, a large-scale Android botnet embedded primarily in low-cost consumer devices such as TV boxes and media players. Investigations highlighted how the botnet leveraged preinstalled malware and backend control infrastructure to enable activities ranging from ad fraud to proxy abuse, often without the device owner’s awareness. Much of the public focus understandably centered on the technical mechanics of the operation: its scale, persistence, and the challenges of disrupting a supply-chain based threat.
Alongside those technical findings, reporting also exposed fragments of human-facing artifacts visible within operational systems, including administrative panels, usernames, and email addresses. These elements, while not central to the botnet’s functionality, offered rare glimpses into the identities interacting with or present around the infrastructure.
This investigation was conducted to examine how far those fragments could be followed using StealthMole alone. Starting from identifiers already published in a KrebsOnSecurity report, specifically email addresses visible inside a BadBox 2.0 control panel screenshot, the goal was not to re-investigate the botnet itself, but to assess how operational artifacts propagate across unrelated datasets when identities are reused over time.
One such identifier became the starting point for this identity trail. What followed was a dense, internally consistent cluster of leaked records spanning Chinese consumer platforms, Western breach datasets, travel records, and social media accounts, repeatedly converging on a single individual: Zhu Zhiyu (朱志宇), also appearing under the English name Xavier Zhu.
Panel-Linked Identifier and Initial Expansion
The investigation began with xavierzhu@qq.com, an email address visible within a BadBox 2.0 control panel screenshot published by KrebsOnSecurity. Its presence in the administrative interface placed it squarely within the operational context of the botnet, making it a suitable anchor for further analysis.
![]() |
When queried through StealthMole’s dark web tracker, this address appeared in multiple leaked datasets. Several of those datasets also referenced cathead@gmail.com, an email already established in the Chen Daihai investigation, indicating early overlap between administrative identity clusters rather than isolated usage.
![]() |
Across these datasets, xavierzhu@qq.com repeatedly resolved to:
- Name: Zhu Zhiyu (朱志宇)
- Username/handle: xavierzhu
- Mobile phone number: 13*********9
- Hash/ID field: 97b8********************************e0
- A government-style identification number: 21*****************1
The consistency of these identifiers across different breach sources suggested long-term reuse rather than one-off exposure, immediately elevating the relevance of the identity behind the email.
Gmail Pivot and Cross-Regional Exposure
Pivoting on the phone number: 13********9 revealed a second core address: xavierzhu@gmail.com. This Gmail account significantly broadened the investigation’s scope, appearing in approximately three dozen leaked datasets spanning Chinese consumer platforms and international services.
![]() |
A JD.com dataset associated the Gmail address with:
- Chinese name: 朱志宇
- Phone numbers: 13************9 and 010********3
Separately, a breach attributed to MGM Grand Hotels listed:
- Name: Xavier Zhu
- Date of birth: 26 October 1986
- Address: Northville, Michigan, USA
- Email: xavierzhu@gmail.com
The convergence of Chinese-language retail data and an English-language hospitality dataset is significant. The reuse of the same Gmail address and phone numbers across both contexts strongly indicates a single individual operating across regions, rather than coincidental overlap or name collision. This dual exposure also suggests that the identity associated with BadBox-linked artifacts was not confined to underground or operational systems, but actively used in mainstream consumer environments.
Social Media Presence and Temporal Persistence
Further enrichment linked xavierzhu@gmail.com to a Twitter account, @x*********1, created in 2017. While the account showed no public posts or visible engagement, its existence adds temporal depth to the identity cluster, demonstrating sustained use of the same naming conventions and email infrastructure over several years.
![]() |
In investigations of operationally sensitive identities, low-activity or dormant social media accounts are frequently observed. Rather than serving as public personas, such accounts often function as recovery anchors, registration artifacts, or identity placeholders. When viewed alongside repeated credential exposure elsewhere, the account aligns with a pattern of long-term identity persistence rather than casual use.
Credential Exposure and Identity Convergence
Beyond account records, credential-style dumps and combo binder results played a critical role in collapsing the remaining distance between identity variants. Searches conducted across StealthMole revealed extensive credential exposure associated with xavierzhu@gmail.com, including nearly one hundred leaked password entries.
![]() |
More importantly than the volume itself was the pattern of reuse. The same passwords appeared repeatedly across:
- xavierzhu@gmail.com
- zhuzhiyu@gmail.com
These repetitions occurred across unrelated breach sources, indicating long-term credential reuse rather than a single compromised platform. Such reuse effectively tied together Gmail, QQ, and auxiliary email identities into a single control cluster, reinforcing the conclusion that they were managed by the same individual.
From an analytical standpoint, this pattern is significant. Credential reuse across personal, professional, and operational contexts increases the likelihood that exposure in one environment can compromise others. In the case of BadBox 2.0, it provides a plausible explanation for how administrative identifiers surfaced publicly in the first place.
Additional Identity Surface: Zhu Zhiyu Variants
Further searches using the Chinese name 朱志宇 uncovered an additional email address: zhuzhiyu@gmail.com, associated with:
- Phone number: 13*************4
- Address: 2nd Floor, Building 12, Gudang Science & Technology Park, No. 38 Zijinhua Road
![]() |
This address appeared consistently across multiple Chinese-language datasets, including e-commerce records. The presence of a structured science and technology park address suggests usage in a professional or semi-professional capacity rather than casual registration.
Credential dumps linked to zhuzhiyu@gmail.com showed password reuse consistent with patterns observed in the xavierzhu@gmail.com account, further reinforcing the convergence of these identities. Additional records also referenced a numeric email variant (13**********4@163.com), a common practice in Chinese online ecosystems, again tied to the same phone number.
![]() |
Conclusion
Starting from a single email address visible in a BadBox 2.0 control panel screenshot published by KrebsOnSecurity, this investigation demonstrates how operational artifacts can be expanded into a comprehensive identity trail when examined through leaked and underground data sources. In the case of Zhu Zhiyu, panel-linked identifiers unfolded into a persistent cluster spanning QQ accounts, Gmail addresses, phone numbers, credential dumps, consumer platforms, and international breach data.
While much of the foundational linkage between these identifiers and BadBox 2.0 had already been established through public reporting, the StealthMole-driven analysis surfaced additional depth. This included the scale of credential exposure, repeated password reuse across identity variants, the existence of a long-standing Twitter account, and the alignment of Chinese and U.S.-based records under a single individual.
Collectively, these findings reinforce a broader pattern observed in BadBox 2.0–related investigations: the most durable links between infrastructure and operators often emerge not from malware or servers, but from human behaviors, credential reuse, identity persistence, and the quiet accumulation of exposure across years of online activity.
Editorial Note
Investigations involving the dark web and leaked data rarely offer absolute certainty. Records may be incomplete, outdated, or partially inaccurate, and attribution must always be approached with caution. This case illustrates how StealthMole helps analysts navigate that uncertainty by correlating fragmented data across sources, allowing patterns to emerge while preserving analytical restraint.
To access the unmasked report or full details, please reach out to us separately.
Contact us: support@stealthmole.com
























































