Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Friday June 02 2017, @02:41PM   Printer-friendly
from the how-to-be-a-top-1000-web-site dept.

Submitted via IRC for TheMightyBuzzard

Check Point Threat Intelligence and research teams recently discovered a high volume Chinese threat operation which has infected over 250 million computers worldwide. The installed malware, Fireball, takes over target browsers and turns them into zombies. Fireball has two main functionalities: the ability of running any code on victim computers–downloading any file or malware, and hijacking and manipulating infected users' web-traffic to generate ad-revenue. Currently, Fireball installs plug-ins and additional configurations to boost its advertisements, but just as easily it can turn into a prominent distributor for any additional malware.

This operation is run by Rafotech, a large digital marketing agency based in Beijing. Rafotech uses Fireball to manipulate the victims' browsers and turn their default search engines and home-pages into fake search engines. This redirects the queries to either yahoo.com or Google.com. The fake search engines include tracking pixels used to collect the users' private information. Fireball has the ability to spy on victims, perform efficient malware dropping, and execute any malicious code in the infected machines, this creates a massive security flaw in targeted machines and networks.

[...] According to our analysis, over 250 million computers worldwide have been infected: specifically, 25.3 million infections in India (10.1%), 24.1 million in Brazil (9.6%), 16.1 million in Mexico (6.4%), and 13.1 million in Indonesia (5.2%). The United States has witnessed 5.5 million infections (2.2%).

Based on Check Point's global sensors, 20% of all corporate networks are affected. Hit rates in the US (10.7%) and China (4.7%) are alarming; but Indonesia (60%), India (43%) and Brazil (38%) have much more dangerous hit rates.

Source: http://blog.checkpoint.com/2017/06/01/fireball-chinese-malware-250-million-infection/


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by MichaelDavidCrawford on Friday June 02 2017, @03:05PM (1 child)

    Twice now I've seen gigs posted on the job boards, seeking someone who will set the browser's homepage while preventing it from being set for anything else.

    --
    Yes I Have No Bananas. [gofundme.com]
    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 3, Insightful) by LoRdTAW on Friday June 02 2017, @05:22PM

    by LoRdTAW (3755) on Friday June 02 2017, @05:22PM (#519456) Journal

    That's the fault of the web browser for allowing a web page to send it commands. There should be ZERO control outside of page rendering. But no. We need all these hooks to allow stupid shit like webcams accessible from your fucking web browser. GREAT idea. Hardware access from the browser. Then we have people clamoring for native clients so you can play call of doody in one tab while surfing for asian porn on the other with ten pop ups and no idea what the fuck is happening under all that sloppy code. Because the browser makes everything so easily portable. Were moving into a hellish future where userspace is a fucking web browser.

    The web is an awful scene full of awful code driven by greed.