Cyber Crime

Chinese Police dismantled the behind the Fireball adware campaign that infected more than 250 Million PCs

Chinese authorities arrested eleven members of the gang behind the Fireball adware campaign that infected more than 250 Million PCs.

Chinese police have identified and arrested individuals suspected to be the operators behind the massive adware campaign that infected more than 250 Million computers across the world earlier this year.

In June, researchers at security firm Check Point discovered the massive campaign spreading the Fireball malware. The malicious code was infecting both Windows and Mac OS systems, it can be used by attackers to gain full controls of the victim’s web browsers, to spy on the victims and exfiltrate user data.

The adware is disguised as a legitimate software and leverages browser plug-ins to boost its own advertisements.

The researchers associated the campaign with the operation of the Chinese firm Rafotech that is a company that officially offers digital marketing and game apps to 300 million customers.

Chinese media outlets reported eleven Rafotech employees arrested by local police, including executives. It seems that the authorities arrested the suspects in June shortly after the publication of the report.

The Chongqing Morning News confirmed that the president, the technical director, and an operations director were arrested by the Chinese Police.

According to the state-owned outlet “Sixth Tone,” the click-fraud netted 80 million yuan, nearly US$12 million.

The Beijing Municipal Public Security Bureau Haidian Branch Network Security Brigade was informed by someone working under the pseudonym Zhang Ming, then the authorities monitored the Fireball campaign tracking its operators.

The individuals have allegedly “admitted the facts,” they were responsible for the campaign that launched around 2015 when the Rafotech setup the advertising fraud.

According to Beijing Youth Daily, the Fireball adware did not infect Chinese users to avoid being investigated by local authorities.

To check the presence of the malware on your systems open your web browser and try to reply the following questions:

  1. Did you set your homepage?
  2. Are you able to modify your browser’s homepage?
  3. Are you familiar with your default search engine and can modify that as well?
  4. Do you remember installing all of your browser extensions?

To uninstall the adware just remove the respective application from the machine and reset to default settings for your browser.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs –  (Fireball, adware)

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Credential Flusher, understanding the threat and how to protect your login data

Credential Flusher is a method that allows hackers to steal login credentials directly from the…

1 hour ago

U.S. Treasury issued fresh sanctions against entities linked to the Intellexa Consortium

The U.S. Department of Treasury issued new sanctions against five executives and one entity linked…

5 hours ago

Broadcom fixed Critical VMware vCenter Server flaw CVE-2024-38812

Broadcom addressed a critical vulnerability in the VMware vCenter Server that could allow remote attackers…

7 hours ago

Remote attack on pagers used by Hezbollah caused 9 deaths and thousands of injuries

Remote attack on pagers used by Hezbollah in Lebanon and Syria caused their explosion; at…

16 hours ago

Chinese man charged for spear-phishing against NASA and US Government

US DoJ charged a Chinese national who used spear-phishing emails to obtain sensitive info from…

1 day ago

U.S. CISA adds Microsoft Windows MSHTML Platform and Progress WhatsUp Gold bugs to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Windows MSHTML Platform and Progress WhatsUp Gold…

1 day ago

This website uses cookies.