Skip to main content

DNSChanger Trojan Still Prevalent In 350K Computers

posted onMay 18, 2012
by l33tdawg

Last year the FBI and international police participated in an operation called “Operation Ghost Click” in which a group of Estonian hackers had distributed various DNS changing programs around the internet. According to VPNReviewz CEO Michael Maxstead, the bots distributed would change the users computers DNS settings, and all the users DNS solutions would be served by the hackers nameservers. DNS servers that, “would send the user to websites that would then install scripts to essentially strip the computer of all personal data.” 

According to Tweets from UsenetReviewz to their users, “Time is running out.” The time referred to is the July 9th deadline for the servers that the FBI and the Internet Systems Consortium are running. The bogus nameservers were replaced with legitimate ones to avoid the sudden shutting down of the internet for the millions of people that were affected. When a computer connects to the internet, the first thing it will look for is the DNS nameserver in the internet settings, and if those servers were suddenly “Turned off” millions would have lost their internet connections.

Source

Tags

Security Viruses & Malware

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th