What is the DNS Changer Malware?
On November 8, the FBI, the NASA-OIG and Estonian police arrested
several cyber criminals in “Operation Ghost Click”. The criminals
operated under the company name “Rove Digital”, and distributed DNS
changing viruses, variously known as TDSS, Alureon, TidServ and TDL4
viruses. You can read more about the arrest of the Rove Digital
principals here, and in the FBI Press Release.
What does the DNS Changer Malware do?
The botnet operated by Rove Digital altered user DNS settings,
pointing victims to malicious DNS in data centers in Estonia, New York,
and Chicago. The malicious DNS servers would give fake, malicious
answers, altering user searches, and promoting fake and dangerous
products. Because every web search starts with DNS, the malware showed
users an altered version of the Internet.
Under a court order, expiring July 9, the Internet Systems
Consortium is operating replacement DNS servers for the Rove Digital
network. This will allow affected networks time to identify infected
hosts, and avoid sudden disruption of services to victim machines.
How Can I Protect Myself?
This page describes how you can determine if you are infected, and
how you can clean infected machines. To check if you’re infected,
Click Here. If you believe you are infected, here are instructions on how to clean your computer.
Bila kondisi PC/Laptop anda berwarna Merah
Silahkan baca petunjuk dibawah ini :
How can you protect yourself from DNS Changer (and other Malware)?
Use the core recommendations to protect yourself from malware like
DNS Changer. In today’s environment, this malware’s goal is to
victimize you, your computers (everyone in your family and/or
organization), and the people around you. It is important to stay
vigilant – protecting yourself.
Sites with Good Guidelines to Protect yourself on-line:
Selengkapnya :
http://www.dcwg.org/
Berita Kompas :
Sorry ini berita lama bro hanya untuk mengingatkan ...