Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Security slackers risk Internet blackout on March 8
02-23-2012, 09:55 PM,
Security slackers risk Internet blackout on March 8
Security slackers risk Internet blackout on March 8
If feds pull down temporary DNS fix as planned, machines infected with DNSChanger Trojan won't be able to access the Web
By Ted Samson | InfoWorld
Follow @tsamson_IW
Print | 4 Comments

Companies and home users whose computers or routers are infected by the DNSChanger Trojan risk being unable to access the Web come March 8, 2012, when the FBI unplugs the legitimate DNS servers it set up to replace the rogue DNS servers that were forwarding victims to malicious sites. The removal of the fed's band aid could impact a substantial number of users, too, as half of Fortune 500 companies and government agencies are infected with the malware, according to a new report.

Back in November, the feds famously took down the DNSChanger botnet network, which a cyber criminal gang was using to redirect Internet traffic to phony websites that existed simply to serve up ads. To prevent the disruption of Internet traffic - and likely to monitor where DNSChanger traffic was coming from - the feds replaced the criminals' servers with clean ones that would push along traffic to its intended destination. Without the surrogate servers in place, infected PCs would have continued trying to send requests to aimed at the now-unplugged rogue servers, resulting in DNS errors.

That surrogate network was supposed to be temporary -- in operation just long enough for companies and home users to remove DNSChanger malware from their machines. Said network is slated to be unplugged on March 8. Once the surrogate server network is unplugged, computers infected with DNSChanger will not be able to access the Internet: The malware will send requests to servers that will no longer be online.

Unfortunately, the cleanup process has been slow, according to security company IID (Internet Identity): The company reports that at least 250 of Fortune 500 companies and 27 out of 55 major government entities had at least one computer or router that was infected with DNSChanger in early 2012.

Companies and users may get a reprise. According to Krebs on Security, the FBI's DNSChanger Working Group is weighing its options, including requesting a court order to extend the March 8 deadline.

Would providing an extension be the most prudent move, though?,0

Did you write down your DNS Settings?

If you followed these instructions, you should have written down your current DNS settings.
Are you safe?

If your computers' DNS settings use the follow ranges, then you likely have been affected by the DNS Changer viruses.

Between this IP... ... and this IP
“The truth, of course, is that a billion falsehoods told a billion times by a billion people are still false.” Travis Walton

Possibly Related Threads...
Thread Author Replies Views Last Post
  Alternatives to the internet shortwave 32 9,331 04-23-2014, 08:58 PM
Last Post: CharliePrime
Exclamation Massive Security Bug In OpenSSL Could Affect A Huge Chunk Of The Internet temp9 7 2,585 04-10-2014, 03:36 PM
Last Post: temp9
  Free Google internet access Orwell63 4 1,331 12-17-2013, 12:17 AM
Last Post: Watchdog
  Internet Storm Center Status JFK 0 1,178 09-24-2013, 01:26 PM
Last Post: JFK
  Get rid of Internet Explorer (again) - It’s more like an exploit than a browser h3rm35 6 1,474 04-20-2013, 04:06 PM
Last Post: CharliePrime
  Web wipeout: Syria suffers nationwide internet blackout zoverload 1 755 11-29-2012, 06:46 PM
Last Post: FastTadpole
  Malware may knock thousands off the internet on Monday zoverload 0 657 07-06-2012, 04:03 PM
Last Post: zoverload
  DNSSEC: the internet's International Criminal Court? h3rm35 3 3,006 04-27-2012, 10:10 AM
Last Post: FastTadpole
  flaws in the key generation that underpins the security of protocols, including SSL. h3rm35 0 617 02-17-2012, 10:27 PM
Last Post: h3rm35
  Eolas patent trial: Relax! The Internet is saved yeti 1 740 02-10-2012, 10:22 PM
Last Post: h3rm35

Forum Jump:

Users browsing this thread: 1 Guest(s)