09
Jul
D(NS) Day – Nobody home?
Article from Rik Ferguson
Filed under: Bad guys always lose,countermeasures,malware,Opinion,Underground Economy,vulnerability | RSS 2.0 | TB | Tags: Apple, botnet, compromise, cybercrime, Denial of Service, DNS, government, malicious code, malware, microsoft, security, web | 2 Comments

spacer
 
The DNSChanger malware modified the local DNS settings of an infected PC. This meant that criminals could assume control over the DNS resolution of the victim computer, effectively redirecting it to any destination of their choice, rather than the bank or search engine the user originally intended to visit (for example).
 
This ability was used primarily for click fraud by the Esthosts gang, redirecting searches and sites, to generate revenue by defrauding advertisers and advertising networks.
 
PCs which are still infected by the malware, or whose settings have not been corrected, even after the infection was cleaned up, are still querying those criminal servers. The FBI have been operating those servers since the warrant was executed, but their right to do so has now expired and the servers will be shut down. Meaning that any queries from those 300,000 computers will fall on deaf ears and to all intents and purposes, the web will go dark for the affected users
 
At the time when Trend Micro co-operated with the FBI in bringing the Esthosts gang to justice, we believed about 4 million PCs to be affected. This number has since dropped to about 300,000 and this should be considered a success. However with the definitive shut-off of the criminal DNS servers today, those 300,000 people face a potential total loss of web access.
 
If you’re reading this, you’re ok, but if your neighbour comes to your door asking who broke the Internet, now’s your chance to play knight in shining armour. And if you work on an ISP help desk… May the force be with you!

 
Image Credit: Camera Eye Photography
 

Related posts:

  1. How to check if you are a victim of Ghost Click
  2. The best form of defence?
  3. Don’t be dumb, keep schtumm!
  4. Beginning of the end for ZeuS/SpyEye?
  5. Malvertising, who’s responsible?

This entry was posted on Monday, 9. July 2012 and is filed under "Bad guys always lose, countermeasures, malware, Opinion, Underground Economy, vulnerability". You can follow any responses to this entry with RSS 2.0. You can leave a response here, or send a trackback from your own site.

2 Comments to "D(NS) Day – Nobody home?"

Dziś Amerykanie wyłączyli serwery zainfekowane złośliwym oprogramowaniem DNS Changer | Cały czas zycie gra ja nawijam:
Tuesday, 10. July 2012 um 9:44 am

[...] countermeasures.trendmicro.eu/dns-day-nobody-home/ [...]

MondayPR • DNS Changer – historii ciąg dalszy:
Wednesday, 18. July 2012 um 10:17 am

[...] countermeasures.trendmicro.eu/dns-day-nobody-home/…]


Name:

E-Mail (not published)

Website:


Spam protection


Keeping your tech safe on summer holiday »
« An app for predators? Technology misapplied.
© Copyright 2010 Trend Micro Inc. All rights reserved.
Legal Notice | Disclaimer

gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.