An expiring US court order will result in loss of Internet access for thousands of computer users. The FBI decided to shut down rogue servers, users whose network has been infected with the DNS Changer Malware will not be able to log on to the internet. If you are not familiar with the DNS Changer Malware which broke free a few years ago, You might be wondering what this fuss is all about. To explain the whole story short this is how I put the story.
The story starts back in 2007 when the DNSChanger Malware first started, looking for your internet settings, guessing your password, and doing unauthorized manipulations to your network settings. The creators also started a company called Rove Digital, got a whole bunch of DNS servers to process their code. Later the FBI got involved in the situation and they did bust in on the devils and took control of their servers, but not before the malware creators cashed out millions of dollars from the malware.
According to the DNS Changer Working Group, as of July 4, there are 45,619 IP Addresses infected in USA, The next is Italy with 21,831 IP Addresses followed by 19,642 IP addresses infected in India.
If you haven’t fixed your System and lose access to Internet, Then you will have to call up your ISP and go through all the fuss of resetting your IP Address and may even have to pay your ISP to do that.
After the US Court Order expires on 9th July 2012, The FBI will shut down all the rouge servers and if you have not cleaned up your infected system by then, You may very well lose access to your favorite Facebook or Youtube. Yeah even Google!
The malware reroutes internet traffic through compromised servers, opening the infected systems up to the dangers of Keyloggers,Trojans and other Malwares which may steal your web experience and manipulate them, Steal credit card details and much more.
How to Identify If Your System Is Infected with DNS Changer Malware.
Thankfully, Checking your system for infection is not a painstaking or time hogging process. It takes only a few seconds. Follow.
Step 1. Visit the following sites and Check the report given by them.
Additionally, You can manually confirm if you are infected by the malware by checking if your DNS has been changed to rouge ones.
Step 1 (a). Open command prompt (Run > cmd).
Step 1 (b). Enter the following command : ipconfig/all
Step 1 (c). Find the DNS Server column in the result and copy it.
Step 1 (d). Go to the FBI DNS Check page and enter the DNS you copied and paste in the box followed by clicking ‘Check my DNS’. If you got “Your IP is not configured to use the rogue DNS servers. ” Then you are safe.
Step 2. If they show your system as Clean, Then you are safe and have nothing to worry about losing Internet access. But if you are shown as infected then there are certain tools that will help you fix the system.
How To Clean Up DNS Changer Malware From Your System.
Step 3. To remove dns changer malware from your system you can use any of these recommended softwares by Top Security Companies. Just download and follow the instructions of the software. The softwares are as follows:
- Trend Micro Housecall
- Norton Power Eraser
- Kaspersky Labs TDSSKiller
- Microsoft Windows Defender Offline
- McAfee Stinger
- Microsoft Safety Scanner
- Hitman Pro (32bit and 64bit versions)
Additional information on how to fix the DNS Changer Malware can be found on this website : [LINK]
Do make sure you share this information with your friends, It is very important that you act fast.