Jump to content

Recommended Posts

Posted

I'm an outdoorsy painter and not much into ins and outs of computers (other than I yell at them lots)

 

Apparently many servers come Monday may have issues

 

CTV News recommended to go to a site.....dns-ok.ca

 

To see if you have this malware issue---it checks it out---if you get a green banner---your good

 

Red---may have issues---apparently there's a fix

 

I had green :thumbsup_anim:

Posted

It's far from a major catastrophe. The number of Canadian computers (max) that MAY be infected would be about the number of computers in Dryden Ontario. That's for all of Canada. I guess you can click on the link if it would make you feel comfortable. I'm not comfortable clicking on anything that will essentially be fingerprinting my computer. But hey.....it's being fingerprinted everyday.....

Posted (edited)

This issue is mostly US related..... seems someone was exploiting DNS servers... so the FBI is shutting them down...

 

Blackout Looming: Thousands To Lose Internet Access As FBI Shuts Down Servers

 

A Server Not Found error message on the Mozilla Firefox Internet browser.

 

 

www.rt.com

 

On July 9, thousands of Internet users worldwide could lose access after the FBI shuts down temporary DNS servers that replaced fraudulent servers operated by hackers.

 

Major companies and US government agencies are amongst those that could be blocked out, according to the Internet security firm IID.

 

The blackout will affect systems infected with the DNSChanger Trojan, a malware program that altered user searches and redirected them to pages offering fraudulent and, in some cases, dangerous products.Continued below.

 

Last November the FBI arrested and charged six Estonian men behind the malware as part of Operation Ghost Click. These hackers were able to make a fortune off their project, raking in millions for ads placed on their fraudulent websites.

 

On the eve of the arrests, the FBI hired Paul Vixie, chairman of the Internet Systems Consortium (ISC) to install two temporary Internet servers that would prevent infected users from losing access to the Internet once the DNSChanger botnet was shut down. These users were advised to take steps to get rid of the malware on their computers, and the DNSChanger Working Group was set up by the computer industry and law enforcement to come up with a plan to phase out the surrogate servers.

 

The FBI was initially planning to shut down their provisional servers in March, but a US district court ruled the provisional servers were to remain operation until July 9.

 

Running the temporary servers for eight months has cost the FBI $87,000.

 

With the looming deadline approaching, estimates suggest up to 360,000 unique Internet addresses are still using the rogue servers, with most of them based in the US, according to federal authorities. Other countries with over 20,000 each include Italy, Canada, India, the United Kingdom and Germany. This is down from the over half a million addresses registered when the six hackers were arrested, but still enough to paralyze the functioning of important websites. At its peak several years ago, up to six million systems worldwide were infected with the malware.

 

The DNS system is a network of servers that translates a web address into a numerical IP address used by computers. Computers affected by the DNSChanger worm were reprogrammed to access rogue DNS servers that redirected them to fraudulent websites.

 

 

G

Edited by Gerritt

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recent Topics

    Popular Topics

    Upcoming Events

    No upcoming events found

×
×
  • Create New...