Sunday 8 July 2012



Internet shutdown July 9: dnschanger malware check up on FBI.


Internet shutdown July 9 is very close to us and people are apprehensive. But dnschanger malware check up can be done on FBI website and several other websites
If you are using Microsoft Windows personal computer, you must be on guard today and tomorrow as you may be a target of malware attack. The whole world seems to be on guard right now and everyone is trying to ascertain if he or ship is a prized target.
But the good thing is the fact that you can check whether you are an intended target or not. There are some websites that you can access and check whether your computer is infected or not. Based on your IP address the website can clearly tell you if you are a target.
There are several website that can automatically detect your IP, but in the case of FBI website that is the most reliable website to detect and advise on the issue, you will have to inset your IP address when you are asked to do. Other websites including Mcafee and dns.ok.u automatically detect your IP addresses and advise you accordingly.
The hackers who are targeting unsuspected internet users want to generate profit (illegally) through automatic impressions and clicks for their online ads. A report while detailing their modus operandi says, “DNS translates domain names like google.com and facebook.com (which are meaningful to humans) into IP addresses (which are meaningful to computers) for the purpose of locating devices on a private network or the Internet as a whole. The theoretical plan is to overload the Internet’s root nameservers, impacting the operation of the entire global DNS, which would affect all Internet services that use it, rather than just specific websites. The World Wide Web as we know it would still be there, but you would only be able to access websites if you know their IP address.”
It is not a rocket science, but a fairly simple process that hackers use it to further their nefarious designs. DNSChanger is a Trojan horse that can be distributed in many forms. When this Trojan or malware is installed on a system it actively changes the infected system’s DNS settings to rogue servers that redirect legitimate searches and URLs to malicious Web sites that attempt to steal personal information and generate illegitimate ad revenue for the scammers. Last year it made headlines across the world and this year too the same is happening.
To be true, The DNSChanger malware first came into general notice some five years ago in the year 2007. Reports suggest that till last year at least half million systems in the US were infected by this malware, while millions of systems across the world got infected. The hackers were able to make hundreds of thousands of dollars by directing unsuspected users to click on their ads. A report suggests that they were able to make around $14 million.
Check your PC whether it is infected with the dnschanger malware

No comments:

Post a Comment