Hundreds of thousands may lose internet in July

Recommended Videos

gyroscopeboy

New member
Nov 27, 2010
601
0
0
"Someone" has been running an online advertising scam, to infect computers with the DNSChanger malware.

To assist victims affected by the DNSChanger malicious software, the FBI obtained a court order authorizing the Internet Systems Consortium (ISC) to deploy and maintain temporary clean DNS servers. This solution is temporary, providing additional time for victims to clean affected computers and restore their normal DNS settings. The clean DNS servers will be turned off on July 9, 2012, and computers still impacted by DNSChanger may lose Internet connectivity at that time.



"The average user would open up Internet Explorer and get 'page not found' and think the Internet is broken."

The FBI is encouraging users to visit a website run by its security partner, http://www.dcwg.org , that will inform them whether they're infected and explain how to fix the problem. After July 9, infected users won't be able to connect to the Internet.

Most victims don't even know their computers have been infected, although the malicious software probably has slowed their web surfing and disabled their antivirus software, making their machines more vulnerable to other problems.

Last November, the FBI and other authorities were preparing to take down a hacker ring that had been running an Internet ad scam on a massive network of infected computers.

"We started to realise that we might have a little bit of a problem on our hands because ... if we just pulled the plug on their criminal infrastructure and threw everybody in jail, the victims of this were going to be without Internet service," said Tom Grasso, an FBI supervisory special agent.

HOW IT WORKS:

Hackers infected a network of probably more than 570,000 computers worldwide. They took advantage of vulnerabilities in the Microsoft Windows operating system to install malicious software on the victim computers. This turned off antivirus updates and changed the way the computers reconcile website addresses behind the scenes on the Internet's domain name system.

The DNS system is a network of servers that translates a web address ? such as www.ap.org ? into the numerical addresses that computers use. Victim computers were reprogrammed to use rogue DNS servers owned by the attackers. This allowed the attackers to redirect computers to fraudulent versions of any website.

The hackers earned profits from advertisements that appeared on websites that victims were tricked into visiting. The scam netted the hackers at least $14 million, according to the FBI. It also made thousands of computers reliant on the rogue servers for their Internet browsing.

When the FBI and others arrested six Estonians last November, the agency replaced the rogue servers with Vixie's clean ones. Installing and running the two substitute servers for eight months is costing the federal government about $87,000.

The number of victims is hard to pinpoint, but the FBI believes that on the day of the arrests, at least 568,000 unique Internet addresses were using the rogue servers. Five months later, FBI estimates that the number is down to at least 360,000. The US has the most, about 85,000, federal authorities said.

Source

Perhaps tied in with Anonymous?
 

Mazza35

New member
Jan 20, 2011
302
0
0
Totally looks like a attempt to use this news to infect more computers.
I WILL NOT COMPLY AND CLICKLY THE LINKY!
 

Valis88

New member
Dec 16, 2008
102
0
0
I did some checking of other news sites, and anti-virus web boards, and it appears that http://www.dcwg.org is actually legit.

This is scary stuff indeed.
 

evilneko

Fall in line!
Jun 16, 2011
2,218
49
53
I wondered when this would pop up again.

That site doesn't appear to be working, or has just been slashdotted. This one, however, does. http://dns-ok.us/ (Yes, it's legit, got it from a trusted source)
 

Lucem712

*Chirp*
Jul 14, 2011
1,472
0
0
Wow, that's sort-a kind-a horrifying. On the PC mag. article they said it was primarily Win/Mac PCs that were infect. I'm not sure if a Linux machine saved me or not, but thanking Linus Torvald anyhow.
 

Nouw

New member
Mar 18, 2009
15,615
0
0
Spit that's pretty serious >.>. It's like an internet quarantine.
 

Valis88

New member
Dec 16, 2008
102
0
0
Here is another article on the matter.

http://www.huffingtonpost.com/2012/04/20/hundreds-of-thousands-may-lose-internet-in-july_n_1441260.html

I must admit that I had a moment of panic when I went to the site...and now. >_<

Here is the Canada link http://www.dns-ok.ca/

Seems legit

http://www.newswire.ca/en/story/958941/cira-participates-in-development-of-online-dnschanger-malware-checker-for-canadians

and

http://internet.bell.ca/index.cfm?method=content.view&category_id=&content_id=17813
 

dyre

New member
Mar 30, 2011
2,178
0
0
Woah, those hackers had a pretty ambitious plan. I think I'd know if my computer was infected by malware though, so I'm glad this won't affect me.

I'm confused though, why would those affected by the DNScharger malware (but no one else) use the clean DNS servers? (I don't know anything about networks and that sort of thing)
 

Doclector

New member
Aug 22, 2009
5,010
0
0
I'm thorougly confused. How am I meant to trust said link? I can't find any articles from people I trust in the UK. Second, there's no way they're gonna explain what I have to do in plain english, is there?

There is one thing though...apparently, it disables your virus protection and slows your computer down, whereas mine appears to be fine.

Oh, and theres the fact that those links come from the government. How do I know they don't just want a way in?
 

Valis88

New member
Dec 16, 2008
102
0
0
Oh great now I'm in a panic, I mean I went to the site, and the Canadian site, did I just get tricked?

Is it real?

I did a scan with my MalwareBytes and I'm clean but....yea I'm panicking.

Now I'm worried. >_<
 

Doclector

New member
Aug 22, 2009
5,010
0
0
Valis88 said:
Oh great now I'm in a panic, I mean I went to the site, and the Canadian site, did I just get tricked?

Is it real?

I did a scan with my MalwareBytes and I'm clean but....yea I'm panicking.

Now I'm worried. >_<
Seems to me that although I'm certain FBI's cyber security is technically competent, they still haven't learnt how this kind of stuff works socially. Most of what is called "hacking" depends on psychology, and most experienced internet users know this, and are wary of warnings of a "mega virus" and a supposed protection from that. I don't know about outside the US, but this being a fairly serious threat if true, I have not seen any posters or tv coverage or even anything in newspapers. That, to a certain extent, you can trust, unless of course, it's in the classified ads or on an open access channel.
 

MammothBlade

It's not that I LIKE you b-baka!
Oct 12, 2011
5,246
0
0
evilneko said:
I wondered when this would pop up again.

That site doesn't appear to be working, or has just been slashdotted. This one, however, does. http://dns-ok.us/ (Yes, it's legit, got it from a trusted source)
Whew, that's a relief. My computer's clean of STDs.
 

Valis88

New member
Dec 16, 2008
102
0
0
Now I'm worried that I just infected myself....by going to that link.

I don't know what to believe. I keep scanning my system and it seems fine but...dammit!

Why did I have such a lapse in common sense. *facedesk*
 

Frostbyte

New member
Jan 1, 2012
82
0
0
I'm not infected, thank god, but has anyone actually checked on the website and found out they are? Just out of interest.
 

Valis88

New member
Dec 16, 2008
102
0
0
Ugh, you guys are right, my FUD gets the best of me when i read stuff like this.

hey this blogger has a good article on the whole thing, and clears up some confusions that I had.

http://ponderingtechnology.wordpress.com/2012/02/25/check-your-dns-settings-now-combat-dnschanger/

Porn sites eh? Trojan Horse?

*whew* I think I'm ok....Thanks Mr Blogger!