FBI Warns DNSChanger Malware Will Create Havoc on Monday

SMS Text

DNSChanger FBI shutting down

On Monday morning, approximately 300,000 computers will lose Internet connectivity due to the DNSChanger malware. The DNSChanger malware, which manipulated DNS settings to replace good DNS servers with rogue servers, redirected unknowing users to webpages filled with advertisements in order to generate illegal profits. Prior to being arrested by the FBI in November of 2011, the six Estonian hackers behind DNSChanger netted over $14 million!

Following the arrests, the FBI took the unusual step of hiring private contractors to prevent millions of worldwide Internet users from immediately losing connectivity. The contractors were able to prevent the service interruption by replacing the malicious servers with clean DNS servers. However, due to the resources required for the DNS servers, the FBI has decided to shut down the clean DNS servers at 12:01 A.M. EDT on Monday, July 9th.

To determine if your computer is one of approximately 300,000 computers still infected with the DNSChanger malware, simply follow the instructions below:

  1. Visit the FBI recommended diagnostic site.
  2. If you are presented with a green background (pictured above), your computer is free of malware. If you are presented with a red background, your computer is infected with the DNSChanger malware.
  3. If your computer is infected, simply visit the “Fix” page and follow the removal instructions or install one of the free malware removal tools.
  4. If you are experiencing an Internet connectivity problem after July 9th and you suspect your computer is infected, contact your ISP for assistance.

Sources Include: Search Engine Journal & Bloomberg Businessweek

David Angotti

David Angotti

After successfully founding and exiting an educational startup in 2009, I began helping companies with business development, search engine marketing (SEM), search engine optimization (SEO), conversion rate optimization (CRO), online marketing, mergers and acquisition, product development, and branding. Now, I am focused on a new startup in the travel and tourism market niche.
David Angotti
  • http://www.orionweb.net Russ Offord

    Interesting that the link to the DNS checker website doesn’t work sometimes. You have to refresh or go to the non-www version to make it work.

    —–

    Oops! Google Chrome could not connect to http://www.dns-ok.us

    Did you mean: dns-­ok.­us

    Additional suggestions:

    Access a cached copy of http://www.­dns-­ok.­us

    Try reloading: http://www.­dns-­ok.­us

    Search on Google

    • Steve

      Does the cached connection work acurately to detect if I get the oops error?

  • Melissa
  • http://www.nayanpopatia.com Nayan

    Too risky, would it be targeting random IP’s or only in certain countries?

  • http://www.stockinghotties.blogspot.com/ Admin

    Lets see Monday how big this really is “

  • http://www.legiamtbmaraton.pl/forum/index.php?action=profile;u=174527 internet ink

    Awesome things here. I am very happy to peer your article. Thank you so much and I am looking ahead to touch you. Will you please drop me a e-mail?