June 5, 2017 By Larry Loeb 2 min read

Check Point Software has sounded the alarm about Fireball, a malware that it estimates to have affected 250 million computers worldwide. Fireball takes over a machine’s browser and turns it into a “zombie,” allowing the malware to run any code on victims’ computers, while at the same time manipulating browser web traffic to generate revenue.

Fireball Malware Spreads Worldwide

Fireball has been distributed by Rafotech, a large digital marketing agency based in Beijing. Rafotech bundled Fireball with legitimate programs like Deal WiFi, Mustang Browser, SoSoDesk and FVP Image Viewer. Such programs may get explicit user consent for their installation, but not direct consent for the bundled programs that are also installed.

SecurityWeek recounts that, overall, India (25.3 million infections) and Brazil (24.1 million) were the largest geographic areas hit by Fireball. They were followed by Mexico (16.1 million) and Indonesia (13.1 million). In the United States, 5.5 million machines were found to be infected.

This is not just a consumer issue. According to Check Point, 20 percent of all corporate networks have been affected. Hit rates have reached as high as 60 percent in Indonesia, 43 percent in India and 38 percent in Brazil. The U.S. and China stand at 10.7 percent and 4.7 percent, respectively.

Fireball’s Tricks

Two of the tricks that Fireball uses are altering the default home page and hijacking the browser’s default search engine by directing the browser to one of its fake search engines. It collects information about its victims using tracking pixels that are part of the fake search engines.

Rafotech claims to have 300 million users worldwide but denies that it uses these fake search engines. Security researchers dispute this claim, noting that Rafotech may have also purchased additional distribution means from other threat actors.

The Fireball malware does not conform to usual characteristics of bundled software. Check Point asserts, “The malware and the fake search engines don’t carry indicators connecting them to Rafotech, they cannot be uninstalled by an ordinary user and they conceal their true nature.” Furthermore, Fireball “displays great sophistication and quality evasion techniques, including anti-detection capabilities, multilayer structure and a flexible C&C.”

Fortunately, the Check Point blog contains instructions on how to remove the malware from both Windows and Mac systems. It would seem prudent to block possible infections directly and to sanitize any affected system.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today