DNSChanger Malware: Produced by US-CERT
US-CERT encourages users and administrators to ensure their systems are not infected with the DNSChanger malware by utilizing tools and resources available at the DNS Changer Working Group (DCWG) website.
Computers testing positive for infection of DNSChanger malware will need to be cleaned of the malware in order to maintain continued internet connectivity beyond July 9, 2012.
On November 8, 2011, the FBI, NASA-OIG, and Estonian police arrested several cyber criminals in “Operation Ghost Click.” The criminals operated under the company name “Rove Digital,” and distributed DNS changing viruses, variously known as TDSS, Alureon, TidServ, and TDL4 viruses.
Additional information about Operation Ghost Click and the DNSChanger malware is available at the FBI website.
Relevant Url(s):
<http://www.fbi.gov/news/stories/2011/november/malware_110911>
This document can also be found at
http://www.us-cert.gov/current/#dnschanger_malware
naturally like your website however you need to check the spelling on several of your posts. A number of them are rife with spelling problems and I find it very bothersome to inform the truth then again I’ll surely come again again.
It’s really a great and helpful piece of information. I am satisfied that you simply shared this helpful information with us. Please keep us informed like this. Thanks for sharing.