DNS Changer Virus 9 July 2012

virus dns
The end is nigh, in keeping with the FBI. "Internet doomsday" can strike us all on nine July when the domain name service changer virus can disconnect several web users from the online.


PC users whose machines are infected with the DNS changer malware should disinfect their pc by nine July, or they'll be prevented by accessing the net. DNS changer has already forced users to fraudulent websites, interrupted net browsing and exposed affected computers to alternative malicious viruses, in keeping with the FBI.

The virus works by redirecting pc users to criminals' DNS servers. DNS servers are the essential web link that switch domain names like Google.co.id into a series of numbers that computers use to speak to every alternative. The virus initially appeared via an internet advertising campaign, that directed net users to criminal sites once they clicked an advertisement.
Users of infected computers are directed to dodgy websites when clicking seemingly real sites. Clicking Amazon for instance, may steer an online users to a website that's unaffiliated with Amazon, exposing users to viruses and denying real sites from advertising revenue.

 Symantec said during a statement: "DNSChanger has been around for a jiffy currently and from a technical perspective nothing has modified from what we all know. It ought to be acknowledged that solely Windows and Mac users are affected. Linux, Android and IOS users don't seem to be. Users who encounter issues with web connectivity may have to contact their IPS for his or her original DNS settings or use a public DNS like google on eight.8.8.8. Also, varied ISPs have already implemented some variety of DNS checks to make sure their customers are either notified or fastened primarily goes dark."

 The DNS virus was allegedly unleashed by six Estonian nationals who are arrested and charged by the FBI when a 2 year operation. The six were charged with running a web fraud ring that "infected voluminous computers worldwide with the virus and enabled the thieves to govern the multi-billion-dollar internet advertising industry".

 Kaspersky Lab, that is investigating matters, told The Huffington Post: "Our consultants at Kaspersky Lab are analysing the technical details of the malware attack that has affected variety of oil facilities in Iran. Preliminary knowledge suggests that files on many computers were overwritten with garbage code, when that the onerous disks on the targeted systems were cleaned by a worm. "The knowledge currently offered neither confirms nor disproves the speculation that this incident was caused by a worm linked to the notorious Duqu or Stuxnet programs. At this time, we've got not identified any of the files of the worm that wipes the system." they said.

There are variety of the way to avoid "internet doomsday". Kaspersky Lab offers TDSSKiller, that detects and removes DNS Changer, whereas an easy visual check is out there at dns-ok.us.


loading...