Author | Message |
Internet will vanish Monday for 300,000 infected computers Users must wipe DNSChanger malware from PCs and Macs before 12:01 a.m. ET July 9By Gregg Keizer
July 6, 2012 06:34 AM ET
Computerworld - As many as 300,000 PCs and Macs will drop off the Internet in about 65 hours unless their owners heed last-minute calls to scrub their machines of malware. According to a group of security experts formed to combat DNSChanger, between a quarter of a million and 300,000 computers, perhaps many more, were still infected as of July 2. DNSChanger hijacked users' clicks by modifying their computers' domain name system (DNS) settings to send URL requests to the criminals' own servers, a tactic that shunted victims to hacker-created sites that resembled real domains. At one point, as many as 4 million PCs and Macs were infected with the malware, which earned its makers $14 million, U.S. federal authorities have said. Infected machines will lose their link to the Internet at 12:01 a.m. ET Monday, July 9, when replacement DNS servers go dark. The servers, which have been maintained under a federal court order by Internet Systems Consortium (ISC), the non-profit group that maintains the popular BIND DNS open-source software, were deployed last year after the Federal Bureau of Investigation (FBI) seized more than 100 command-and-control (C&C) systems during the take-down of the hacker gang responsible for DNSChanger. The FBI's "Operation Ghost Click" ended with arrests of six Estonian men -- a seventh, a Russian, remains at large -- the C&C seizures, and the substitution of the replacement servers. Without the substitutes, DNSChanger-infected systems would have been immediately knocked off the Internet. Originally, the stand-in servers were to be turned off March 8, but a federal judge extended th... to July 9. It's not just consumer PCs and Macs -- DNSChanger was equal-opportunity malware -- that remain infected, but also corporate computers and systems at government agencies, said Tacoma, Wash.-based Internet Identity (IID), which has been monitoring cleanup efforts. Last week, IID said that its scans showed 12% of Fortune 500 firms, or about one out of every eight, harbored DNSChanger-compromised computers or routers. And two out of 55 scanned U.S. government departments or agencies -- or 3.6% -- also had failed to scrub all their PCs and Macs. The newest numbers were down from earlier scans by IID. In March, for example, the company pegged the Fortune 500 DNSChanger infection rate at 19% and the government agency rate at 9%. In January, both groups' rate was an amazing 50%. But there are still tens of thousands of laggards who have not cleaned their computers, even after a months-long effort by the DNSChanger Working Group (DCWG), a volunteer organization of security professionals and companies. "We're all struggling with this," said Rod Rasmussen, chief technology officer of IID and a member of the DCWG. "There are a lot of people who just haven't gotten the word." The cleanup, Rasmussen said, has been the tough part of the DNSChanger takedown. "There was a lot of planning done for the initial takedown, the arrests, the swapping of servers, but there wasn't as much for after the take-down," said Rasmussen. "How do we clean things up? Victim remediation is a challenge for our industry. Everyone wants to do it, but how do you pay for it?" | |
- E-mail - orgNote - Report post to moderator |
Ensure the FBI doesn't shut down your PC on July 9(AP) (MoneyWatch) COMMENTARY There's a chance you'll lose access to the Internet in just a few days -- on Monday, July 9.
That's the date on which the FBI is scheduled to pull the plug on DNS servers through which your PC might be connecting to the Internet. And if that happens, your PC will be unable to connect to any Web sites. Confused? Let's take a step back. Last year, a particularly malicious malware called DNSChanger infiltrated both personal and corporate PCs across the Internet, redirecting computers to a set of DNS servers which were programmed to direct Web searches to malicious Web sites. The FBI broke up the conspiracy, made some arrests, and seized the bad DNS servers. But because a large number of PCs were already pointed at these servers, the Feds continued to operate them with clean and authentic DNS data. Well, the clock is about to run out on those servers -- they're due to come offline on July 9. Any PCs still using them will find themselves unable to connect the Internet when the plug is pulled. I warned you about this once before when the kill date was expected to be March 8, but this new date seems firm. The malware no longer circulates the Web, but your PC might be infected and you could be unaware. (Though to be honest, the odds are low -- especially if you run any sort of anti-virus or anti-malware software.) To be sure, though, visit dns-ok-us to run a quick check to see if your computer is infected. Also go to the DNSChanger Working Group's website for more detailed testing information and for instructions on how to rid your network of the malware.
| |
- E-mail - orgNote - Report post to moderator |
Please let all 300,000 belong to either Ditto Heads, rappers, or both. Amen. | |
- E-mail - orgNote - Report post to moderator |
I think if you get a message on Facebook or Google warning about "I think your computer might be infected", chances are your internet will shut down on the 9th. Though I can't get into that dns-ok website I think believe my connection's OK. | |
- E-mail - orgNote - Report post to moderator |
Further reading is it seems that only about 70,000 computers in the U.S. are still infected with that DNSChanger thing. This malware thing was expected to shut down on March 8 but was pushed back to the 9th of this month. | |
- E-mail - orgNote - Report post to moderator |
TIME article about this
Security & Privacy
By Matt Peckham | July 6, 2012
Dozens of news outfits are amping up this DNSChanger malware “event” on Monday with stories bearing apocalyptic titles like “Countdown to Internet Doomsday: Will Your Computer Survive?” or “How to survive internet doomsday” or “End of the Internet? ‘Doomsday’ virus will crash thousands of computers on July 9.”
Here’s the deal. If you haven’t already, click this simple infection checker, run by the DNS Changer Working Group (DCWG) to determine if your computer has the malware (you’ll get an instant thumbs up or down). If not — celebrate good times! — you’re free and clear.
---- So much ado about nothing. Unless you still got an infection, chances are the internet will still be up and running on July 9th. This sounds more like a scare tactic.
Still, check to see if you still got malware in your computer. The DNS-OK site is not working so if you have that Anti-Malware Bytes software, check it through there. If none of your drives have it, you're cool. | |
- E-mail - orgNote - Report post to moderator |
Okay, you know I always need you guys to hip me onto the latest lingo: Rodeo, what on earth are Ditto Heads??? | |
- E-mail - orgNote - Report post to moderator |
LOL, that particular phrase is at least 20 years old.
The sheep that listen to Rush Limbaugh have, for over two decades, started almost every phone call to his show with the phrase, "Mega dittoes, Rush!" meaning that they heartily agree with whatever tripe he had just said.
So his followers became known as "Ditto Heads". | |
- E-mail - orgNote - Report post to moderator |
maybe that would not be such a bad thing for me My Legacy
http://prince.org/msg/8/192731 | |
- E-mail - orgNote - Report post to moderator |
well if anyone is not sure about their pc any one of these tools will scan and remove the threat..
Hitman Pro (32bit and 64bit versions)
http://www.surfright.nl/en/products/
Kaspersky Labs TDSSKiller
http://support.kaspersky.com/faq/?qid=208283363
McAfee Stinger
http://www.mcafee.com/us/downloads/free-tools/stinger.aspx
Microsoft Windows Defender Offline
http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline
Microsoft Safety Scanner
http://www.microsoft.com/security/scanner/en-us/default.aspx
Norton Power Eraser
http://security.symantec.com/nbrt/npe.aspx
Trend Micro Housecall
http://housecall.trendmicro.com
MacScan
http://macscan.securemac.com/
Avira
http://www.avira.com/en/support-for-home-knowledgebase-detail/kbid/1199 Avira’s DNS Repair-Tool | |
- E-mail - orgNote - Report post to moderator |