DNSChanger Deadline Coming – Are You At Risk?


On November 8, 2011 the FBI, the NASA-OIG and Estonian police arrested several cyber criminals in “Operation Ghost Click”. The criminals operated under the company name “Rove Digital”, and distributed DNS changing viruses. By altering a users DNS settings this virus would point victims to malicious DNS servers in data centers in Estonia, New York, and Chicago. The malicious DNS servers would then give fake, malicious answers, altering user searches, and promoting fake and dangerous products.

Because every web search starts with DNS, the malware showed users an altered version of the Internet. All Sorts of BAD!

Right Now

All of this DNSChanger mess is about to come to a close, and a number of Internet users are going to be left without any access. Reason being, after the FBI recently broke up the hacker group, they set up temporary DNS servers which matched the virus. This allowed users affected by the virus to connect to the Internet safely and securely.

But, the FBI is planning to shut down those temporary DNS servers on Monday, July 9. This will then make the users affected by the DNSChanger virus unable to connect to the internet as the DNS settings will come up invalid.

What To Do

First off, don’t panic, there are steps to ensure that, even if you’re infected with the DNSChanger virus, you’ll be able to take some steps to get back online without too much distress.

Click on the link here – this page, which takes you to the DNS Chang Working Group, describes how you can determine if you are infected, and how you can clean our infected machines. On that page is another link, http://www.dns-ok.us, click through there and run the Check Up.

What you WANT to see is an image like the one below – green screen, saying all is well. If you don’t get that follow the instructions on how to clean up your environment.

About DCWG

The DCWG is an ad hoc group of subject matter experts, and includes members from organizations such as Georgia Tech, Internet Systems Consortium, Mandiant, National Cyber-Forensics and Training Alliance, Neustar, Spamhaus, Team Cymru, Trend Micro, and the University of Alabama at Birmingham.

You can read more about the arrest of the Rove Digital principals here, and in the FBI Press Release. This page is hosted at the Georgia Institute of Technology, under a research grant provided by the Office of Naval Research.

Sources: http://www.dcwg.org | http://www.cbc.ca

James Hickshttp://about.me/jameshicks
James is the Founder and Editor-in-Chief of HicksNewMedia, a Digital Publishing and Technology Consulting team providing effective and relevant solutions to individuals and businesses looking to more effective utilize the social interweb. Follow him on Twitter and on Facebook.

More from author

Leave a Reply!

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related posts



Latest posts

Business Ideas for Travel Lovers

Do you love to travel? If you want to explore the world, but be able to make money as you do just...

17 Things You Can Do in iOS 14 That You Couldn’t Do Before

Say hello to iOS 14, which is rolling out as a free over-the-air software upgrade for iPhones right now (if you have an iPhone...

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!