DNSChanger Trojan Still Prevalent In 350K Computers
Last year the FBI and international police participated in an operation called “Operation Ghost Click” in which a group of Estonian hackers had distributed various DNS changing programs around the internet. According to VPNReviewz CEO Michael Maxstead, the bots distributed would change the users computers DNS settings, and all the users DNS solutions would be served by the hackers nameservers. DNS servers that, “would send the user to websites that would then install scripts to essentially strip the computer of all personal data.”
According to Tweets from UsenetReviewz to their users, “Time is running out.” The time referred to is the July 9th deadline for the servers that the FBI and the Internet Systems Consortium are running. The bogus nameservers were replaced with legitimate ones to avoid the sudden shutting down of the internet for the millions of people that were affected. When a computer connects to the internet, the first thing it will look for is the DNS nameserver in the internet settings, and if those servers were suddenly “Turned off” millions would have lost their internet connections.
- Thu, 2013-01-17 01:40
- Wed, 2012-12-12 01:45
- Tue, 2012-08-14 23:24