marți, 3 aprilie 2012

Oz launches DNSChanger testing site

Government service advises of connection-preventing malware infections 

Australia's government has created a website which detects the presence, or otherwise, of DNSChanger, a nasty piece of malware which the sites says “... changes a user's Domain Name System (DNS) settings, enabling criminals to direct unsuspecting internet users to fraudulent websites and otherwise interfere with their web browsing.”
“It has been associated with 'click fraud', the installation of additional malware and other malicious activities,” the site adds.

The hiply-named www.dns-ok.gov.au does what it says on the can: load up the site and you'll be told whether or not the malware lurks within your system and if, ergo, your DNS is okay. If you are infected, the site urges you to do something about it before the FBI switches off its kludge fix that stops the malware from doing it's worst.

What is DNSChanger?

DNSChanger is a class of malicious software (malware) that changes a user's Domain Name System (DNS) settings, enabling criminals to direct unsuspecting internet users to fraudulent websites and otherwise interfere with their web browsing. It has been associated with 'click fraud', the installation of additional malware and other malicious activities.

In November 2011, the FBI closed down a ring of cyber-criminals believed to be responsible for the worldwide spread of DNSChanger.

An estimated four million users were affected worldwide. To avoid these victims losing their internet service, the FBI worked with the Internet Systems Consortium (ISC) to set up and operate a temporary but correct DNS solution, while giving ISPs the opportunity to assist their customers to remove their potential infection.

This temporary solution is expected to be switched off as early as 9 July 2012. It is likely that users infected by DNSChanger will be unable to connect to the internet when the temporary DNS solution is switched off.

Niciun comentariu:

Trimiteți un comentariu