June 5, 2017 By Larry Loeb 2 min read

Check Point Software has sounded the alarm about Fireball, a malware that it estimates to have affected 250 million computers worldwide. Fireball takes over a machine’s browser and turns it into a “zombie,” allowing the malware to run any code on victims’ computers, while at the same time manipulating browser web traffic to generate revenue.

Fireball Malware Spreads Worldwide

Fireball has been distributed by Rafotech, a large digital marketing agency based in Beijing. Rafotech bundled Fireball with legitimate programs like Deal WiFi, Mustang Browser, SoSoDesk and FVP Image Viewer. Such programs may get explicit user consent for their installation, but not direct consent for the bundled programs that are also installed.

SecurityWeek recounts that, overall, India (25.3 million infections) and Brazil (24.1 million) were the largest geographic areas hit by Fireball. They were followed by Mexico (16.1 million) and Indonesia (13.1 million). In the United States, 5.5 million machines were found to be infected.

This is not just a consumer issue. According to Check Point, 20 percent of all corporate networks have been affected. Hit rates have reached as high as 60 percent in Indonesia, 43 percent in India and 38 percent in Brazil. The U.S. and China stand at 10.7 percent and 4.7 percent, respectively.

Fireball’s Tricks

Two of the tricks that Fireball uses are altering the default home page and hijacking the browser’s default search engine by directing the browser to one of its fake search engines. It collects information about its victims using tracking pixels that are part of the fake search engines.

Rafotech claims to have 300 million users worldwide but denies that it uses these fake search engines. Security researchers dispute this claim, noting that Rafotech may have also purchased additional distribution means from other threat actors.

The Fireball malware does not conform to usual characteristics of bundled software. Check Point asserts, “The malware and the fake search engines don’t carry indicators connecting them to Rafotech, they cannot be uninstalled by an ordinary user and they conceal their true nature.” Furthermore, Fireball “displays great sophistication and quality evasion techniques, including anti-detection capabilities, multilayer structure and a flexible C&C.”

Fortunately, the Check Point blog contains instructions on how to remove the malware from both Windows and Mac systems. It would seem prudent to block possible infections directly and to sanitize any affected system.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today