Thousands of Aussie Internauts could get Disconnected from the Net
ACMA (Australian Communications and Media Authority) is cautioning users of Mac and Windows who've been infected with the DNSChanger Trojan that they must cleanse the malware now; otherwise on July 9, 2012, they'll be endangered with getting disconnected from the Net, published CSO dated March 29, 2012.
Notably, being one massive botnet globally, DNSChanger apparently contaminated 4m OS X and Windows PCs during one gigantic fake anti-virus and click-fraud campaign, thwarted during late 2011 via "Operation GhostClick" of FBI.
ACMA reports that the DNSChanger ploy that understandably yielded USD14m to Estonian scammers was busted while the US FBI took over its servers during November 2011. From that time on, the servers are maintained as active in order that computer-users aren't disrupted in their online operations; however, they'll be disabled on 9th July 2012.
Historically, the DNSChanger diverted contaminated systems onto malicious Domain Name Server (DNS) solution tools following manipulation of the DNS settings of those infected PCs.
Moreover, when infected end-users attempt at accessing ACMA via manually entering acma.gov.au into the address bar of their Web-browsers, they'll be taken onto an unintended IP address that connects with a phony security software website, a phishing site, alternatively additional malware.
Manager of e-Security Unit, Bruce Matthews at ACMA stated that the manner the malware infected end-users most frequently involved viewing malevolent e-mail attachments or going to dubious sites via web-links embedded on an e-mail. Smh.com.au published this on March 29, 2012.
Indeed, a website named dns-ok.gov.au is now available, thanks to the joint efforts of communications regulator as well as other government organizations, through which Web-surfers can examine their PCs whether there's malware on their systems, and if so, cleanse it. Prepared alongside CERT Australia's cooperation, the website very well explains the problem as also connects for assisting affected end-users eradicate it.
In the meantime, Sophos the security firm cautioned that despite the removal of the malware, end-users could encounter problems in going online incase the DNS configurations weren't reset on their PCs. Precisely, even suppose one's AV software pronounced a system as malware-free, the DNSChanger might continue to affect indirectly, Sophos it explained.
Related article: Thousands of Webpages Compromised
» SPAMfighter News - 09-04-2012