Friday, 6 July 2012

DNSChanger Malware Set to Knock Thousands Off Internet on Monday


Thousands of PCs worldwide may be unable to access the Internet beginning July 9 unless those machines are rid of the pernicious DNS Changer malware that first surfaced in 2007. The Federal Bureau of Investigation helped shut down the criminal ring responsible for DNS Changer in late 2011. The federal agency then briefly handled the Internet Domain Name System routing for all infected Mac and Windows systems. Since early 2012, the Internet Systems Consortium, a nonprofit corporation, took over DNS routing responsibilities from the FBI. But that courtesy is coming to an end Monday, and if your computer is one of the thousands still infected, you need to fix your machine so you can keep getting online.
What did DNS Changer Do?
DNS Changer rerouted infected computers through servers controlled by a criminal ring based in Eastern Europe. The malware did this by taking advantage of the Internet's Domain Name System (DNS) service. Think of DNS servers like phone books for the Internet. These servers turn the plain text Web address that you enter into your browser, such as PCWorld.com, into a string of numbers. These numbers are known as Internet Protocol addresses and computers use them to connect to one another and get around the Internet. IPs are assigned to home and business Internet connections and every website you visit. It should be pretty clear that DNS is not something you want to have intercepted by criminals. Any time they want, criminals who control how your computer uses DNS can do malicious things such as reroute your computer to fraudulent websites. Once there, the sites can try to download more malware to your computer or attempt to harvest data such as login credentials. DNS changing was only one of the malware's functions, according to the DNS Changer Working Group, a consortium of companies, universities and other institutions helping to deal with the impact of DNS Changer. The group says it's also possible DNS Changer could have also been capturing keystrokes (known as key logging). As of June 11, the group detected DNS Changer infections from more than 300,000 unique Internet Protocol Addresses worldwide. Nearly 70,000 of those unique IPs originated in the United States. An Internet Protocol address counts as one main connection to the Internet, but can include multiple PCs behind one IP.

How to Know if You're Infected

If your computer is infected with DNS Changer and you've recently visited Facebook or Google, then you've probably seen warnings about your system being infected with DNS Changer. Both services are posting notices to systems infected with DNS Changer and offering advice about what to do about the infection. Your Internet Service Provider may have also notified you about an infection. Another way to find out if you're infected is to visit one of several detection websites set-up by the DNS Changer Working Group. These sites will not require you to download any extra software or scan your hard drive. If you are infected, the site will be able to immediately detect it and notify you. The bad news is that DNS Changer doesn't just go after PCs, but can also infect your router. That means you may visit a malware detection site from any PC in your home and all will register as being infected even though your router is really the culprit. If you want to be absolutely sure your computer is clean, you can check your PC's DNS settings without relying on a third-party website. A tutorial “Protect Yourself From DNS Changer” has detailed instructions on how to do this for PCs and Macs.

What to Do if You're Infected

If you've determined that your PC is running DNS Changer malware, there are several things you can do. The DNS Changer Working Group has a list of free removal tools from major computer security firms including Kaspersky, McAfee, MacScan, Symantec and Trend Micro, as well as a Microsoft tool. Before you use any of these tools, you need to backup your personal files. The DNS Changer Working Group also suggests that infected users might be better off switching to a new PC if they were already thinking of upgrading their current system. Another option, and perhaps the safest bet if you're sticking with your current PC, is to backup your files, reformat your hard drive and reinstall your OS. If you determine that your router is infected, contact your Internet Service Provider for help. DNS Changer may not be that widespread anymore (this year infections were detected at half of all Fortune 500 companies).

No comments:

Post a Comment