New computer virus targets Venezuelans after vote

Oct 12, 2012

(AP)—A newly detected computer virus aims to steal Venezuelans' online credentials using a link that purports to reveal information about the country's recent presidential election, the digital security company Kaspersky Lab said on Friday.

The was launched after Venezuela's Oct. 7 presidential election and was spread by email, said Dmitry Bestuzhev, head of the Moscow-based company's research and analysis team in Latin America.

At least 75 Kaspersky customers came under attack by the malware, and non-customers surely did, too, he said.

Bestuzhev said in a blog post on Friday that the malicious file is named "listas-fraude-electoral.pdf.exe," which translates as "electoral fraud lists"—a title likely to make some Venezuelans curious after President 's re-election victory.

He explained by email that computer users received an email message with a link. Once a victim clicked on the link, he said, the person was redirected to a fake website purporting to belong to the Venezuelan Globovision.

"After the click the malicious file was automatically downloaded," Bestuzhev said. However, said its antivirus system successfully blocked each attempt by the malware to infect its customers' computers.

Bestuzhev said the malware allows criminals to steal victims' banking information and also online credentials for those holding accounts with Venezuela's currency agency, known by its Spanish initials CADIVI.

Venezuela's government maintains strict foreign currency exchange controls, and the currency agency provides people who apply with limited amounts of dollars or other currencies for purposes including travel, certain imported goods and overseas tuition payments.

The malware was designed to gain access to Venezuelans' CADIVI accounts to use their allotted dollars, Bestuzhev said.

"Being that this malware is quite simple and also targeting only Venezuelan banks and CADIVI, we can strongly assume that the cybercriminals who produced it are from Venezuela too," he wrote on the blog.

Officials at the government's currency agency and Science and Technology Ministry could not be immediately reached for comment.

Bestuzhev said the malware was detected by was "proactive crawlers," which work like a sort of search engine and are designed to hunt down malicious URLs.

Explore further: Twitpic to stay alive with new owner

More information: Bestuzhev's blog post: www.securelist.com/en/blog/208… _from_the_Government

2 /5 (1 vote)
add to favorites email to friend print save as pdf

Related Stories

Hackers promise AFP photos in 'email scam'

Oct 21, 2011

A computer security firm warned on Friday that cybercriminals were attempting to exploit Agence France-Presse photos of slain Libyan dictator Moamer Kadhafi in an email scam.

Shoplifters hit up Chrome Store for Facebook data

Mar 28, 2012

(PhysOrg.com) -- A cash-for-Facebook’s-“likes” hustle hanging out in Google Chrome Web Store has been discovered by Kaspersky Lab. The researchers first discovered extensions leading to the ...

Recommended for you

Facebook dressed down over 'real names' policy

Sep 17, 2014

Facebook says it temporarily restored hundreds of deleted profiles of self-described drag queens and others, but declined to change a policy requiring account holders to use their real names rather than drag names such as ...

Yelp to pay US fine for child privacy violation

Sep 17, 2014

Online ratings operator Yelp agreed to pay $450,000 to settle US charges that it illegally collected data on children, in violation of privacy laws, officials said Wednesday.

User comments : 0