In three weeks, the FBI could knock millions of infected systems offline by disabling some DNS servers as techspot reported. In November, Estonian authorities arrested six men suspected of using "DNSChanger Trojan" malware to redirect victims to malicious websites and block them from genuine security sites that might've removed the infection. According to a report by Brian Krebs, the Trojan was on over four million computers in more than 100 countries, including 500,000 in the US -- and not just home users, either. The malware is reportedly still present on computers at half of the Fortune 500 companies and at approximately half of all federal agencies.
Come March 8, the court order allowing the feds to replace the bogus DNS servers will expire. Unless that's extended, the surrogate servers will be unplugged and millions still plagued by DNSChanger will lose Web access. Even the order is prolonged, experts worry the cleanup will take years as with Conficker.
Checking your system for DNSChanger is relatively simple. You can use ipconfig /all in the Windows command prompt to get your DNS information, which can be compared against the numbers here. The DNSChanger Working Group also provides a list of free resources that'll help you clean your machine(s).
Millions Copies of Dirt 3 keys leaked onto web - 09/07/2011 07:42 AM
Publishers Codemasters and graphics card manufacturer AMD have been running a promotion lately whereby purchasers of a card got a free copy of excellent racer Dirt 3. That offer has now been, uh, slig...
Millions infected by new Windows Worm - 01/19/2009 11:53 AM
The malicious program, known as Conficker, Downadup, or Kido was first discovered in October 2008. Although Microsoft released a patch, it has gone on to infect 3.5m machines. Experts warn this figure...