DNS Changer Malware
Posted by admin on Mar 5, 2012
Recently, the FBI uncovered a network of Domain Name System (DNS) servers controlled by cyber criminals. The FBI worked in collaboration with international law enforcement agencies and the cyber security community to disable these malicious DNS servers. Unfortunately, this malicious infrastructure has been used for over 3 years to steal personal information from millions of people around the world. Cyber criminals managed to infect these users’computers with malicious code that changes the users’ DNS configurations to forward all their web content requests to a rogue DNS rather than a legitimate one. As DNS is necessary for most internet activities, the FBI implemented a plan for a trusted private-sector, non-government entity to operate and maintain a clean DNS server for the infected victims until they can be identified and notified.
Cybercriminals use malicious software (malware) called DNSChanger to change the DNS settings in your computer to use one of their DNS servers instead of the ones that your internet provider uses. This malware resides in your computer, but can also affect your home or business network. It may leave your vulnerable to criminal organizations that could misuse and redirect your internet traffic.
To see if your system has been infected, visit www.dns–ok.ca – this website checks your computer settings to see if it’s infected with DNSChanger. If the screen is green, you’re not affected. If the screen is red, your computer is infected with the DNSChanger malware. You should do this test on all computer/laptops within your household or business.
If you are infected, then take your system to your local computer repair shop and they will be able to remove the malware and restore the security settings in your system.
Click here for more information.