Fireball

From HandWiki - Reading time: 3 min

Fireball is a browser hijacking malware discovered by the security company Check Point. It takes over target browsers and turns them into zombies.[1][2][3][4][5]

Discovery

Check Point claims to have discovered Fireball malware in 2017 but Microsoft claims that it has been tracking the malware since 2015.[6]

Authorship

The malware has been tracked to a Chinese company called Rafotech. They are a digital marketing agency based in Beijing. They have been bundling it with legitimate software that they provide to users. Some of the programs that Rafotech bundled the Fireball software are Deal WiFi, Mustang Browser, SoSoDesk and FVP Image Viewer.[7]

Rafotech claims to have 300 million users (similar to the estimated number of infections) worldwide but denies that it uses these fake search engines. Security researchers dispute this claim, noting that Rafotech may have also purchased additional distribution means from other threat actors.[6] Their fake search engines are popular with 14 of them ranked among the top 10,000 websites and some reaching the top 1,000.[7]

Inner workings

Malware has the ability of running any code on victim computers, such as downloading an arbitrary file and hijacking and manipulating infected user's web traffic in order to generate advertisement revenue. It installs plugins and additional configurations to boost its advertisements, and has potential to turn into a distributor for any additional malware. Malware is spread mostly via bundling. It is installed on a victim's machine alongside a wanted program, often without the user's consent.[2] Digital marketing agency Rafotech has been indicated as producer of the software. The same company has been accused to host fake search engines, which redirect the queries to yahoo.com or google.com. The fake search engines include tracking pixels used to collect private information from users. Fireball manipulates the infected browsers and turn their default search engines and home pages into the above-mentioned fake search engines, which enable the software to spy on users of the infected browsers.

The Fireball malware does not conform to usual characteristics of bundled software. Check Point asserts, “The malware and the fake search engines don’t carry indicators connecting them to Rafotech, they cannot be uninstalled by an ordinary user and they conceal their true nature.” Furthermore, Fireball “displays great sophistication and quality evasion techniques, including anti-detection capabilities, multilayer structure and a flexible C&C.”[8]

Another deception is the use of legitimate-seeming Digital certificates. Rafotech's fake search engines and the malware itself doesn't carry any identifying marks.[8]

The program has the capability to run arbitrary code, download applications and harvest more sensitive information, such as banking and medical details. Cyber criminals could leverage the source code to create new types of malware.[6]

Infections

It is estimated that 250 million computers are infected worldwide. Check Point researches also claim that this malware might have infected computers on 20% of corporate networks, making it a high volume internet threat. According to this source, the highest infection rates were discovered in Indonesia, India and Brazil. It is speculated that the related browser hijackers operations form possibly the largest infection operation in history.[1]

Table 1 The top countries that have been infected with the Fireball malware

Country % infected Number of infections (in millions) Hit Rate
India 10.1% 25.3 43%
Brazil 9.6% 24.1 38%
Mexico 6.4% 16.1 N/A
Indonesia 5.2% 13.1 60%
US 2.2% 5.5 10.7%

There is some dispute to these numbers according to Microsoft, it has been tracking the malware since 2015. Its results are based on the Fireball infections that have been cleaned by Windows Defender and the Malicious Software Removal Tool. Based on the collected data the total infections are 40 million. Check Point researchers used the number of visits to malware-carrying search pages not the device itself.[6]

References

  1. 1.0 1.1 "FIREBALL – The Chinese Malware of 250 Million Computers Infected". Check Point. June 2017. http://blog.checkpoint.com/2017/06/01/fireball-chinese-malware-250-million-infection/. 
  2. 2.0 2.1 Leyden, John (2 June 2017). "Goodness gracious, great Chinese 'Fireball' malware infects 250m systems worldwide". The Register. https://www.theregister.co.uk/2017/06/02/fireball_adware_menace/. 
  3. Morris, David (3 June 2017). "Hack Brief: Dangerous 'Fireball' Adware Infects a Quarter Billion PCs". Fortune. http://fortune.com/2017/06/03/chinese-fireball-malware-infection/. 
  4. Greenberg, Andy (2 June 2017). "Hack Brief: Dangerous 'Fireball' Adware Infects a Quarter Billion PCs". Wired. https://www.wired.com/2017/06/hack-brief-dangerous-fireball-adware-infects-quarter-billion-pcs/. 
  5. Loeb, Larry (5 June 2017). "Fireball Malware Explodes Around the World". Security Intelligence. https://securityintelligence.com/news/fireball-malware-explodes-around-the-world/. 
  6. 6.0 6.1 6.2 6.3 "Fireball Malware: Ticking Time Bomb or All Hot Air?" (in en-US). Security Intelligence. https://securityintelligence.com/news/fireball-malware-ticking-time-bomb-or-all-hot-air/. 
  7. 7.0 7.1 "Fireball Malware Infects 250 Million Computers | SecurityWeek.Com" (in en). http://www.securityweek.com/fireball-malware-infects-250-million-computers. 
  8. 8.0 8.1 "Fireball Malware Explodes Around the World" (in en-US). Security Intelligence. https://securityintelligence.com/news/fireball-malware-explodes-around-the-world/. 





Licensed under CC BY-SA 3.0 | Source: https://handwiki.org/wiki/Software:Fireball
5 views | Status: cached on November 12 2024 23:38:00
↧ Download this article as ZWI file
Encyclosphere.org EncycloReader is supported by the EncyclosphereKSF