Fake “Official CIA Election AntiCheat Control” Malware Requests $50 - How to, Technology and PC Security Forum | SensorsTechForum.com

Fake “Official CIA Election AntiCheat Control” Malware Requests $50

ransomware-malware-lockscreen-fake-cia-warning-sensorstechforum
New malware has appeared that takes advantage of the 2016 presidential elections in the US. The virus displays a fraudulent lock screen message claiming it is originating from the CIA. The message displays that the malware is a legitimate program that aims to make sure nobody cheats duing the 2016 election and it’s purpose is human verification by paying a hefty sum of 50$ via PaySafeCard. Anyone who came across the message from the picture above should immediately remove this malware from their computer by reading the information in this article.

Images Source: Michael Gillespie on Twitter

Threat Summary

Name

Official CIA Election AntiCheat Control

TypeLockscreen Ransomware
Short DescriptionThe malware displays a fake message that prompts victims to verify that they are human by paying $50 to a PaySafeCard account.
SymptomsThe user may witness the images of Donald Trump and Hillary Clinton along with a long note which aims to rope them into falling for this scam.
Distribution MethodVia an Exploit kit, Dll file attack, malicious JavaScript or a drive-by download of the malware itself in an obfuscated manner.
Detection Tool See If Your System Has Been Affected by Official CIA Election AntiCheat Control

Download

Malware Removal Tool

User ExperienceJoin our forum to Discuss Official CIA Election AntiCheat Control malware.
Data Recovery ToolWindows Data Recovery by Stellar Phoenix Notice! This product scans your drive sectors to recover lost files and it may not recover 100% of the encrypted files, but only few of them, depending on the situation and whether or not you have reformatted your drive.

How Is CIA Election AntiCheat Malware Spread?

There may either be malicious files or malicious web links linking to files associated with CIA Election AntiCheat malware. Such objects may be distributed via several different ways, the primary of which is believed to be massive e-mail spam campaigns undertaken by cyber-criminals. Such spam campaigns are often related to either spam bots or external spammers whose services may have been requested by CIA Election AntiCheat Malware. Not only this, but CIA Election AntiCheat is also believed to use other methods to spread like social media websites or file sharing services.

CIA Election Control Malware – More Information

This virus is both old and new because it uses a tactic that is well-known for most police ransomware viruses that are combined with a lock-screen message and this is nothing revolutionary.

Even the police message aims to induce fear in the average user (voter) just like FBI ransomware variants do:

“CIA Election Control
This program is sent out to people across America to make sure that nobody is cheating in the 2016 Election. CIA And FBI have received numerous reports proving that citizens of United States of America are not going to be using fair techniques to gain votes for both presidents.
To verify yourself as a human and to help United States of America to get a new president by fair voting you need to pay a CIA Election Fee (50$)
Steps to provide that you are a human and is using fair voting methods:
1) Go to any PaySafeCard Retailer and purchase a code for 50$
2) Enter the code that you purchased in the textbox below.
3) Wait (up to 10 hours) to get your payment validated, and your vote will count as a vote.”

What is new in this malware, however, is that it uses PaySafeCard methods for it’s payment which is not typical for most lock screen viruses as they use BitCoin.

The virus is even pre-programmed to scan for a valid PaySafeCard code:

asas

After this is performed, the virus displays a message that states wether the PaySafeCard payment is complete or there is an error and if there is an error, it even displays what that error is:

cvw4ecoweaa199u-jpg-large

These type of cheap lock-screen scams are nothing new and malware researchers strongly advise users who have been affected not to pay any type of ransom fee because there is no such thing as a CIA AntiCheat Control for the American people. Instead, we urge you to remove this virus from your computer completely.

Removing CIA Election Control Malware Safely

You can go hunting for the malicious files that the malware has created by following the manual instructions in our article and looking for files with commonly generated malicious names and in the often targeted Windows folders:

commonly-used-file-names-and-folders

Another safer and more effective strategy is to boot your computer in Safe Mode to isolate CIA Election Control malware and scan it via an advanced anti-malware program that should make sure the virus’s files as well as the registry subkeys and value strings I has modified or created are automatically and fully removed, instructions for which you may find below.

Manually delete Official CIA Election AntiCheat Control from your computer

Note! Substantial notification about the Official CIA Election AntiCheat Control threat: Manual removal of Official CIA Election AntiCheat Control requires interference with system files and registries. Thus, it can cause damage to your PC. Even if your computer skills are not at a professional level, don’t worry. You can do the removal yourself just in 5 minutes, using a malware removal tool.

1. Boot Your PC In Safe Mode to isolate and remove Official CIA Election AntiCheat Control files and objects
2.Find malicious files created by Official CIA Election AntiCheat Control on your PC

Automatically remove Official CIA Election AntiCheat Control by downloading an advanced anti-malware program

1. Remove Official CIA Election AntiCheat Control with SpyHunter Anti-Malware Tool and back up your data
Optional: Using Alternative Anti-Malware Tools

Vencislav Krustev

A network administrator and malware researcher at SensorsTechForum with passion for discovery of new shifts and innovations in cyber security. Strong believer in basic education of every user towards online safety.

More Posts - Website

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.