Kaspersky Lab publishes an article entitled "Brazil: a country rich in banking Trojans"

16 Oct 2009
Virus News

Kaspersky Lab, a leading developer of Internet threat management solutions that protect against all forms of malicious software including viruses, spyware, hackers and spam, announces the release of an article entitled “Brazil: a country rich in banking Trojans”. The article by Dmitry Bestuzhev, Senior Regional Researcher for Latin America provides an overview of how cybercriminals target online banking systems.

Statistics show that Brazil is a major source of banking Trojans – malicious programs designed to target online banking customers. The article describes how these Trojans are used to stealthily penetrate computers belonging to Brazilian users and how cybercriminals use them to steal funds from victims' bank accounts.

"Brazil's highly stratified social structure often means that those on a low income are drawn into illegal activity, including writing malicious programs designed to steal banking data," explains Dmitry Bestuzhev. "Additionally, Brazil does not have legislation which effectively combats cybercrime." Bradesco, Caixa, Banco do Brasil and Itaú are the banks most commonly targeted by banking malware.

Bestuzhec comments in the article that: “Social networking sites have become an important source for almost any type of personal information: full name, date of birth, address etc. This information can easily be used by cybercriminals to ‘officially’ get a user's PIN code from a bank's call centre."

The author concludes with details on how cybercrime can be combated and recommends Brazilian banks should invest more heavily in security solutions, which will offer their customers reliable protection, including distributing tokens or other security devices free of charge.

The full version of the article is available at www.viruslist.com/en. A summary of the article can be found at www.kaspersky.co.uk.

This material can be reproduced provided the author, company name and original source are cited. Reproduction of this material in re-written form requires the express consent of the Kaspersky Lab UK PR department.