June 5, 2017 By Larry Loeb 2 min read

Check Point Software has sounded the alarm about Fireball, a malware that it estimates to have affected 250 million computers worldwide. Fireball takes over a machine’s browser and turns it into a “zombie,” allowing the malware to run any code on victims’ computers, while at the same time manipulating browser web traffic to generate revenue.

Fireball Malware Spreads Worldwide

Fireball has been distributed by Rafotech, a large digital marketing agency based in Beijing. Rafotech bundled Fireball with legitimate programs like Deal WiFi, Mustang Browser, SoSoDesk and FVP Image Viewer. Such programs may get explicit user consent for their installation, but not direct consent for the bundled programs that are also installed.

SecurityWeek recounts that, overall, India (25.3 million infections) and Brazil (24.1 million) were the largest geographic areas hit by Fireball. They were followed by Mexico (16.1 million) and Indonesia (13.1 million). In the United States, 5.5 million machines were found to be infected.

This is not just a consumer issue. According to Check Point, 20 percent of all corporate networks have been affected. Hit rates have reached as high as 60 percent in Indonesia, 43 percent in India and 38 percent in Brazil. The U.S. and China stand at 10.7 percent and 4.7 percent, respectively.

Fireball’s Tricks

Two of the tricks that Fireball uses are altering the default home page and hijacking the browser’s default search engine by directing the browser to one of its fake search engines. It collects information about its victims using tracking pixels that are part of the fake search engines.

Rafotech claims to have 300 million users worldwide but denies that it uses these fake search engines. Security researchers dispute this claim, noting that Rafotech may have also purchased additional distribution means from other threat actors.

The Fireball malware does not conform to usual characteristics of bundled software. Check Point asserts, “The malware and the fake search engines don’t carry indicators connecting them to Rafotech, they cannot be uninstalled by an ordinary user and they conceal their true nature.” Furthermore, Fireball “displays great sophistication and quality evasion techniques, including anti-detection capabilities, multilayer structure and a flexible C&C.”

Fortunately, the Check Point blog contains instructions on how to remove the malware from both Windows and Mac systems. It would seem prudent to block possible infections directly and to sanitize any affected system.

More from

The major hardware flaw in Apple M-series chips

3 min read - The “need for speed” is having a negative impact on many Mac users right now.The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability that can expose cryptographic keys, leading an attacker to reveal encrypted data. This critical security flaw, known as GoFetch, exploits a vulnerability found in the M-chips data memory-dependent prefetcher (DMP).DMP’s benefits and vulnerabilitiesDMP predicts memory addresses that the code is most…

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today