What is the DNS Changer Malware?
On November 8, the FBI, the NASA-OIG
and Estonian police arrested several cyber criminals in “Operation Ghost
Click”. The criminals operated under the company name “Rove Digital”, and
distributed DNS changing viruses, variously known as TDSS, Alureon, TidServ and
TDL4 viruses.
DNS Changer is a
malware computer programme that redirects Internet traffic to fake websites.
What does the DNS Changer Malware do?
The botnet operated by Rove Digital
altered user DNS settings, pointing victims to malicious DNS in data centers in
Estonia, New York, and Chicago. The malicious DNS servers would give fake,
malicious answers, altering user searches, and promoting fake and dangerous
products. Because every web search starts with DNS, the malware showed users an
altered version of the Internet.
How Can I Protect Myself?
This page describes how you can determine if you are infected, and how you
can clean infected machines. To check if you’re infected, Click Here. If you believe you
are infected, here are instructions on how to clean your computer.
A “green” background
in the image given above means that your computer is safe while a “red”
background means that your system has been infected by the virus and it needs
to be fixed.
Reportedly, DNS Changer will only attack Windows users. So, Apple and other operating system users can relax.
If you are using a rogue server you can use this website to check the status of your system. All you need to do is find the IP address of your system and enter it on the space which says ‘check your DNS’. This will help you to see the virus status.
To check your DNS Click Here.
The virus affected machines are likely to lose
web access as FBI will shut down servers associated with the DNS Changer malware
today. As a result, it is likely that all computers infected with this threat
will no longer be able to access the Internet.
No comments:
Post a Comment