Feeds

Biz urged to blast DNSChanger Trojans before safety net comes down

8 March cutoff following Operation Ghost Click

3 Big data security analytics techniques

Half of all Fortune 500 companies still contain computers infected with the DNSChanger Trojan, weeks after a FBI-led takedown operations targeting the botnet's command-and-control infrastructure.

DNSChanger changed an infected system's domain name system (DNS) resolution settings to point towards rogue servers that redirected legitimate searches and URLs to malicious websites, earning cybercrooks kickbacks from click-fraud scams and scareware distribution rackets in the process. The FBI stepped in and dismantled the botnet's command-and-control infrastructure in November.

The takedown operation – codenamed Operation Ghost Click – led to the arrest of six Estonian nationals, accused of manipulating millions of infected computers via DNSChanger. At its peak as many as four million machines were hijacked by the malware.

Rogue DNS servers were temporarily replaced by legitimate servers but nothing was done to disinfect pox-ridden PCs. That left organisations at a heightened risk of attack, not least because DNSChanger disables anti-virus software and security updates on infected machines.

A study by IID (Internet Identity), published on Thursday, found at least 250 of all Fortune 500 companies and 27 out of 55 major government entities had at least one computer or router on their network still infected with DNSChanger. The stats come data from IID's ActiveKnowledge Signals system as well as information from other leading security and Internet infrastructure outfits.

Darkness will fall

Barring further court actions, legitimate servers that were set up to replace rogue DNS servers will be deactivated on 8 March, 120 days after the initial takedown operation. Unless infected machines are fixed they will not be able to browse the web or send emails as normal after 8 March, once the plug is pulled on the replacement domain-name-to-IP-address-resolution servers upon which they currently rely.

Fortunately help is at hand through the ad-hoc DNSChanger Working Group and security firms such as Avira.

Avira has published a tool designed to allow users to see if their machines are infected with DNSChanger malware. The German firm, best known for its freebie security scanner software, has also released a free DNS-Repair tool so users can revert to the default settings of Windows with only a few clicks.

Sorin Mustaca of Avira explained the importance of taking action now, rather than waiting for possible problems to appear next month.

"If your computer was infected at some point in time and it was using one of the DNS servers which are now controlled by the FBI, after March 8, it will no longer be able to make any DNS requests through these servers," he said. "In layman’s terms, you will no longer be able to browse the web, read emails and do everything you usually do on internet. So, it is mandatory that the DNS settings of the computer are restored to their original state."   More information on how to clean up infected machines before time runs out can be found at the DNS Changer Working Group website. ®

3 Big data security analytics techniques

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.