Welcome to DU!
    The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
    Join the community:
    Create a free account
    Support DU (and get rid of ads!):
    Become a Star Member
    Latest Breaking News
Editorials & Other Articles
General Discussion
The DU Lounge
    All Forums
        Issue Forums
        Culture Forums
        Alliance Forums
        Region Forums
        Support Forums
        Help & Search
    
Make sure "DNS Changer Malware" isn't infecting your MS or Linux system(s).
Another DU thread on this here: http://www.democraticunderground.com/10952045
What is the DNS Changer Malware?
On November 8, the FBI, the NASA-OIG and Estonian police arrested several cyber criminals in Operation Ghost Click. The criminals operated under the company name Rove Digital, and distributed DNS changing viruses, variously known as TDSS, Alureon, TidServ and TDL4 viruses. You can read more about the arrest of the Rove Digital principals here, and in the FBI Press Release.
What does the DNS Changer Malware do?
The botnet operated by Rove Digital altered user DNS settings, pointing victims to malicious DNS in data centers in Estonia, New York, and Chicago. The malicious DNS servers would give fake, malicious answers, altering user searches, and promoting fake and dangerous products. Because every web search starts with DNS, the malware showed users an altered version of the Internet.
Under a court order, expiring July 9, the Internet Systems Consortium is operating replacement DNS servers for the Rove Digital network. This will allow affected networks time to identify infected hosts, and avoid sudden disruption of services to victim machines.
How Can I Protect Myself?
This page describes how you can determine if you are infected, and how you can clean infected machines. To check if youre infected, Click Here. If you believe you are infected, here are instructions on how to clean your computer.
On November 8, the FBI, the NASA-OIG and Estonian police arrested several cyber criminals in Operation Ghost Click. The criminals operated under the company name Rove Digital, and distributed DNS changing viruses, variously known as TDSS, Alureon, TidServ and TDL4 viruses. You can read more about the arrest of the Rove Digital principals here, and in the FBI Press Release.
What does the DNS Changer Malware do?
The botnet operated by Rove Digital altered user DNS settings, pointing victims to malicious DNS in data centers in Estonia, New York, and Chicago. The malicious DNS servers would give fake, malicious answers, altering user searches, and promoting fake and dangerous products. Because every web search starts with DNS, the malware showed users an altered version of the Internet.
Under a court order, expiring July 9, the Internet Systems Consortium is operating replacement DNS servers for the Rove Digital network. This will allow affected networks time to identify infected hosts, and avoid sudden disruption of services to victim machines.
How Can I Protect Myself?
This page describes how you can determine if you are infected, and how you can clean infected machines. To check if youre infected, Click Here. If you believe you are infected, here are instructions on how to clean your computer.
More at The DNS Changer Working Group (read the whois under the About/Contact tab at the Home page): http://www.dcwg.org/
					
						3 replies
						
							
  = new reply since forum marked as read
						
					
     
					
						Highlight:
						NoneDon't highlight anything
						5 newestHighlight 5 most recent replies
					
				
				
						Make sure "DNS Changer Malware" isn't infecting your MS or Linux system(s). (Original Post)
						Amonester
						Apr 2012
						OP
					
      
      
      
      
      
      
Important information.
bemildred
(90,061 posts)2. Green, thanks. nt
        karnac
(564 posts)3. Linux is vulnerable indirectly
        IF you have multiple platforms on your home network like I do(Linux,Win7,XP,OSX),
the virus might be able to change dns settings on your router from an infected machine.
If so, your uninfected machines might still wind up connecting to fake malicious sites.
This should be preventable by making SURE you  have changed the default router login/password to something not too obvious. Not talking about wifi keys. that's another unrelated issue.