{"id":8491,"date":"2017-07-28T08:10:34","date_gmt":"2017-07-28T16:10:34","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/28\/news-2265\/"},"modified":"2017-07-28T08:10:34","modified_gmt":"2017-07-28T16:10:34","slug":"news-2265","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/07\/28\/news-2265\/","title":{"rendered":"Fireball arrests made"},"content":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Fri, 28 Jul 2017 15:30:25 +0000<\/strong><\/p>\n<p>Following some arrests in China, we may see a decrease in the amount of adware and adfraud hailing from the Rafotech labs.<\/p>\n<p>According to some <a href=\"https:\/\/www.theregister.co.uk\/2017\/06\/02\/fireball_adware_menace\/\">reports<\/a> 250 million machines may have been infected with one variant or another of Rafotechs\u2019 products. We have <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/fireball-chinese-malware\/\">shared some information<\/a> about the potential risks associated with their malware before. But according to <a href=\"https:\/\/www.theregister.co.uk\/2017\/07\/26\/beijing_police_hot_on_fireball_fraudware_trail\/\">this article in The Register<\/a> the organization may have been beheaded by the eleven arrests the Chinese police made.<\/p>\n<p>This graph shows how many detections Malwarebytes (versions 2 &amp; 3) reported back for the month of July so far. The numbers of detections shown in the graph are only for <a href=\"https:\/\/blog.malwarebytes.com\/detections\/adware-elex\/\">Adware.Elex and associated detections<\/a>.<\/p>\n<div id=\"attachment_19029\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/detections.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-19029 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/detections-600x221.png\" alt=\"Elex graph july\" width=\"600\" height=\"221\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/detections-600x221.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/detections-300x110.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/detections.png 1526w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p class=\"wp-caption-text\"><em>click to enlarge<\/em><\/p>\n<\/div>\n<p>As you can see we have hit the 30,000 detections per day on occasion. Keep in mind, there are other families attributed to Fireball, but these have different vendor names. Anyway, we hope this curve will take a dive very soon.<\/p>\n<p>On the surface Fireball infections may seem like just another browser hijacker, that simply changes your start-page, and the default search engine, but a closer look reveals capabilities of <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/adware-vs-ad-fraud\/\">ad fraud<\/a>, data gathering, and to download and install other malware. Also the methods in use by Elex covered almost <a href=\"https:\/\/blog.malwarebytes.com\/puppum\/2017\/06\/draftadware-the-series-part-6\/\">the entire range of methods<\/a>, including rootkits.<\/p>\n<p>Reports about the arrests vary, but all sources agree that some of the most important managers of Rafotech were included. Rafotech is a digital marketing agency that earns money by combining the adware and browser hijackers in <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/bundler\/\">bundlers<\/a>.<\/p>\n<p>Remind me to have another look at the graph next month, so we can see if the arrests have had the effect we hoped for.<\/p>\n<p>Pieter Arntz<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/fireball-arrests-made\/\">Fireball arrests made<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/fireball-arrests-made\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Pieter Arntz| Date: Fri, 28 Jul 2017 15:30:25 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/fireball-arrests-made\/' title='Fireball arrests made'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/07\/shutterstock_653176414.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Following some arrests in China, we hope to see a decrease in the amount of adware and adfraud hailing from the Rafotech labs aka Fireball.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/malware\/\" rel=\"category tag\">Malware<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ad-fraud\/\" rel=\"tag\">ad fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/adware\/\" rel=\"tag\">adware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/elex\/\" rel=\"tag\">elex<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fireball\/\" rel=\"tag\">fireball<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pieter-arntz\/\" rel=\"tag\">Pieter Arntz<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rafotech\/\" rel=\"tag\">rafotech<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/fireball-arrests-made\/' title='Fireball arrests made'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/07\/fireball-arrests-made\/\">Fireball arrests made<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10499,10468,4503,12568,12558,3764,10523,12570],"class_list":["post-8491","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ad-fraud","tag-adware","tag-cybercrime","tag-elex","tag-fireball","tag-malware","tag-pieter-arntz","tag-rafotech"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8491"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8491\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8491"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}