Share This

Monday, June 11, 2012

Warning DNSChanger victims, check for malware!

Facebook joins Google in warning DNSChanger victims

Warnings follow decision to withdraw safety net on 9 July


Federal authorities will not seek a further extension to a DNSChanger safety net, meaning an estimated 360,00 security laggards will be unable to use the internet normally unless they clean up their systems before a 9 July deadline.

DNSChanger changed the domain name system (DNS) settings of compromised machines to point surfers to rogue servers – which hijacked web searches and redirected victims to dodgy websites as part of a long-running click-fraud and scareware distribution racket. The FBI dismantled the botnet's command-and-control infrastructure back in November, as part of Operation GhostClick.

In place of the rogue servers, a bank of duplicate machines was set up to resolve internet look-up queries from compromised boxes. This system was established under a court order, which has already been extended twice. The move meant users of compromised machines could use the internet normally – but the safety net by itself did nothing to change the fact that infected machines needed to be cleaned.

At its peak as many four million computers were infected by DNSChanger. An estimated 360,000 machines are still infected and there's no sign that further extending the safety net will do any good, hence a decision to try other tactics while withdrawing the DNS safety net, which has served its purpose of granting businesses with infected machines time to clean up their act.

Last week Facebook joined Google and ISPs in notifying DNSChanger victims‎ that they were surfing the net using a compromised machine.

"The warnings are delivered using a 'DNS Firewall' technology called RPZ (for Response Policy Zones)," Paul Vixie, chairman and founder of Internet Systems Consortium, told El Reg. "This allows infected users (who are using the 'replacement' DNS servers) to hear different responses than uninfected users (who are using 'real' DNS servers). We can control how an infected user reaches certain websites by inserting rules into the RPZ," he added.

More information – along with clean-up advice – can be found on the DNS Changer Working Group website here. ®

 By John Leyden • Get more from this author

 Newscribe : get free news in real time 

PC users urged to check for malware

PETALING JAYA: Come July 10, thousands of computers infected with the DNSChanger malware (malicious software) will be disconnected from the Internet if their users don't take some necessary steps.

The problem is that many PC users may not even know that their computers have been infected.

F-Secure Labs Malaysia security adviser Goh Su Gim explained that the United State Federal Bureau of Investigation (FBI) planned to shut down hacker-controlled servers that had been reprogrammed to prevent infected PCs from being suddenly disconnected, causing support-call chaos.

Security issue: The F-Secure response lab in Kuala Lumpur. The cybersecurity company warns that thousands of infected PCs worldwide may be affected if the DNSChanger malware is not removed by July 10.
 
The servers were temporarily reprogrammed after the arrest of six Estonians believed to have created the malware in November last year.

The servers, located in Estonia and the United States, will be deactivated on July 9 and PCs still infected with DNSChanger will not function normally as they will not be able to access these servers.

For more story in The Star Tue 14, June 2012

No comments: