DNSChanger Malware: Produced by US-CERT

US-CERT encourages users and administrators to ensure their systems are not infected with the DNSChanger malware by utilizing tools and resources available at the DNS Changer Working Group (DCWG) website.

Computers testing positive for infection of DNSChanger malware will need to be cleaned of the malware in order to maintain continued internet connectivity beyond July 9, 2012.

On November 8, 2011, the FBI, NASA-OIG, and Estonian police arrested several cyber criminals in “Operation Ghost Click.” The criminals operated under the company name “Rove Digital,” and distributed DNS changing viruses, variously known as TDSS, Alureon, TidServ, and TDL4 viruses.

Additional information about Operation Ghost Click and the DNSChanger malware is available at the FBI website.

Relevant Url(s):

<http://www.dcwg.org/>

<http://www.fbi.gov/news/stories/2011/november/malware_110911>

 

 

This document can also be found at

http://www.us-cert.gov/current/#dnschanger_malware

 

2 replies
  1. speed camera
    speed camera says:

    naturally like your website however you need to check the spelling on several of your posts. A number of them are rife with spelling problems and I find it very bothersome to inform the truth then again I’ll surely come again again.

    Reply
  2. lingerie
    lingerie says:

    It’s really a great and helpful piece of information. I am satisfied that you simply shared this helpful information with us. Please keep us informed like this. Thanks for sharing.

    Reply

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply to lingerie Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.