You Might Want to Check This Out, Saw It on the News Here This Morning...

Updated on July 06, 2012
T.M. asks from Jamestown, CA
10 answers

Google DNS changer threat...

They said on July 9th a lot of us that don't even realize our computers have been infected will know... because they wont work anymore.
That would make a lot of moms mad :)
I'll post the link to the test on the swh.

This is the second time it was on the news, I believe I heard about it 4 mos ago or so. The link is legit. BUT I suppose it COULD BE A WAY OF BIG BROTHER forcing their way into our lives more than they already have too. I'm not concerned tho, and my screen was green-- YAY!

1 mom found this helpful

What can I do next?

  • Add yourAnswer own comment
  • Ask your own question Add Question
  • Join the Mamapedia community Mamapedia
  • as inappropriate
  • this with your friends

So What Happened?

http://www.dcwg.org/detect/

Thousands of computer owners may find it impossible to reach the Internet on Monday despite an unprecedented campaign by a coalition of tech security groups and the online giants Google (GOOG) and Facebook, which have sought to warn people about the malicious software known as DNSChanger.

It's unclear how many computers are still infected with the software. But experts believe the extraordinary outreach by law enforcement, computer security experts and big Internet companies has whittled the number down from more than 500,000 to less than 70,000 in the United States since the FBI busted the East European crooks behind the malware scheme last fall.

Because some users still don't know their computers have the malware, experts are urging people to run a diagnostic test offered by several legitimate security sites before Monday.

That's when authorities plan to shut down a temporary server network, operated under an unusual arrangement between federal authorities and a nonprofit group, that allowed infected machines to continue visiting the Internet after the FBI broke up a crooked advertising operation that was hijacking those computers and sending them to bogus or unauthorized websites.

Experts say the outreach campaign

has already produced valuable experience and data that may help in the continuing battle against new malware schemes.

Google and Facebook each used different technical methods of determining which users might have the DNSChanger infection, according to security consultant Barry Greene, a member of the public-private working group that's been tackling the problem.

While Google has alerted users to a potential malware threat once before, Greene said he wasn't aware that Facebook had ever done so. Google began showing notices to affected users in May; Facebook followed suit last month.

Although neither company was apparently affected directly by the malware, both depend on advertising for revenue and have an interest in combating crooked ad schemes.

In this case, the malware worked by interrupting the Internet's Domain Name System, which converts user-friendly website names (such as www.fbi.gov) into the numeric addresses that computers need to connect with those sites. When victims unwittingly downloaded the DNSChanger program, authorities said, the malware began sending their computers to rogue servers controlled by a ring of cyberthieves.

Those servers would then send the victims to other rogue sites: For example, a user who tried to visit legitimate sites run by Apple (AAPL) or Netflix (NFLX) would be taken to sites that sold unauthorized products. Other times, users were sent to legitimate sites but were shown ads on those sites from businesses that had not paid to be legitimate sponsors.

After the FBI broke up the ring, authorities realized the malware on victims' computers would continue sending them to the rogue servers -- or it would send them nowhere, if the rogue servers were shut down. So the government hired the nonprofit Internet Systems Consortium to operate replacement servers on a temporary contract, to give victims time to disinfect their computers.

An initial contract for three months was extended this spring, but officials said they never intended the replacement servers to be a permanent solution.

Authorities initially estimated that DNSChanger had hijacked 4 million computers around the world, after users visited infected websites or downloaded a program they thought would let them view online videos. That included 500,000 computers in this country, belonging to individuals, corporations and even government agencies such as NASA.

Those numbers have been trimmed in recent months. Using data from the rogue servers, the Internet Systems Consortium notified service providers if their customers appeared to be using infected equipment. A Comcast spokesman said his company used both electronic messages and old-fashioned written letters to alert affected customers.

Google, meanwhile, made arrangements with the consortium so any infected computer that tried to do a Google search would be routed to a special Google address, where they would see a warning about the malware.

Experts said many of the remaining infected machines may no longer be in use. But at least some users may find themselves unable to access websites, email or other Internet services Monday, said Dave Marcus at McAfee, the Intel (INTC)-owned computer security provider.

Contact Brandon Bailey at ###-###-####; follow him at Twitter.com/BrandonBailey.

Malware help

Here are some sites that offer diagnostic tools and information about the DNSChanger malware. Since DNSChanger also disables security software, experts advise running a general scan with an anti-malware program after removing DNSChanger from your computer.

The FBI has background on the case and tips on checking your computer at www.fbi.gov/news/stories/2011/november/malware_110911.

The nonprofit DNSChanger Working Group has information at www.dcwg.org and a free scanning tool at www.dns-ok.us.

Comcast customers can go to www.xfinity.com/dnsbot to obtain software that will remove the malware.

McAfee, which sells security software, is offering a free scanning service at www.mcafee.com/dnscheck.

Source: Mercury News reporting

Featured Answers

Smallavatar-fefd015f3e6a23a79637b7ec8e9ddaa6

☆.A.

answers from Pittsburgh on

Here is some more information.

http://www.wired.com/threatlevel/2012/07/dns-changer-goin...

My ISP was able to do the test...no bot here!

ETA: Relax, people, that is a legitimate link. And this malware has been around for a long time. 7 men were arrested last November. It IS a big deal!

3 moms found this helpful

More Answers

X.O.

answers from Chicago on

Thanks for sharing this. Yes, this is TOTALLY a legit threat.

My BIL is a software engineer and he told me the threat is real, as did my uncle who works in IT. My mom let me know about it first, and she also confirmed the threat by checking the FBI.gov website.

3 moms found this helpful
Smallavatar-fefd015f3e6a23a79637b7ec8e9ddaa6

D..

answers from Charlotte on

I'd be a little afraid to click on the link in that article (for English) in case going there might be what infects my computer, to be honest...

Dawn

3 moms found this helpful

C.O.

answers from Washington DC on

T.:

I'm sorry - I don't click on things (links) I don't know about.

I didn't see any reference to July 9th.

And to me? this sounds like propaganda to get you to purchase a product to "supposedly" help you find malware. If you have McAfee or some other security program - you should run it regularly. Turn your computers OFF at night. There is sooo much you can do to stay safe and protected. The best is to NEVER click on links you do not know.

3 moms found this helpful

B.S.

answers from Lansing on

Just heard of this today from a coworker who said it was in the paper.

I'm skeptical....but then again that's because I'm a skeptic.

2 moms found this helpful

K.M.

answers from Chicago on

Go thru YOUR computer's protection program, mine is McAfee, they have a site just to check this out. You should be fine so long as you keep your antivirus running like McAfee's does.

2 moms found this helpful
Smallavatar-fefd015f3e6a23a79637b7ec8e9ddaa6

M.M.

answers from Dallas on

Sounds like the Y2K thing all over again. Remember how that turned out? I watch the national news every morning and evening (on 2 different networks) and have heard nothing from them. I saw a blurb about it on-line. Since it really isn't making any real headlines, I don't take it too seriously. But I have been wrong once before... :) Thanks for the heads up though!

1 mom found this helpful

E.A.

answers from Erie on

This is reason #2 we use linux operating systems, we've never had a virus. Reason #1 is that it's FREE.

V.W.

answers from Jacksonville on

I have an aunt who is also an IT expert, and she sent me an email this morning reminding me to check our computers for the malware. We all came up green. AND our ISP is not redirecting DNS traffic, so we are good.
:)

Smallavatar-fefd015f3e6a23a79637b7ec8e9ddaa6

M.L.

answers from Colorado Springs on

I e-mailed my computer guy about this earlier today. He said that the virus has "been pretty much put to bed." He checked my computer and said the pest wasn't there.

For Updates and Special Promotions
Follow Us

Related Questions