Facebook Starts Notifying DNSChanger Victims
Facebook alerts owners of DNSChanger-infected computers that they need to take action before July 9
As a result of our work with the group (DNSChanger Working Group), Facebook is now able to notify users likely infected with DNSChanger malware and direct them to instructions on how to clean their computer or networksFacebook security team
Facebook has started notifying victims of the DNSChanger malware who visit the social networking site that their computers will be cut off from the Internet on July 9, if they don't clean them until that time.
Facebook's DNSChanger alerts will include a link the DNSChanger Working Group's website, which contains more information about the malware and instructions on how to remove it.
"Earlier this year, Facebook joined the clean up effort by participating in [DNSChanger Working Group], which is comprised of computer security experts from the public, private, and academic sectors," the Facebook security team said in a blog post on Monday. "As a result of our work with the group, Facebook is now able to notify users likely infected with DNSChanger malware and direct them to instructions on how to clean their computer or networks."
DNSChanger is a family of Trojan programs that hijack Web search queries, display malicious advertisements and redirect users to fake websites. They do this by forcing infected computers to use DNS servers controlled by attackers.
DNS servers play a very important role on the Internet -- they translate domain names into numerical Internet Protocol (IP) addresses that computers use to communicate with each other. By default, most computers use DNS servers operated by their respective Internet service providers (ISPs) -- entities that are implicitly trusted with routing their connections.
DNSChanger is a family of Trojan programs that hijack Web search queries, display malicious advertisements and redirect users to fake websites
The FBI shut down the DNSChanger operation in November 2011 following a two-year investigation and temporary replaced the rogue DNS servers with legitimate ones. The replacement servers are operated by a non-profit organization called the Internet Systems Consortium, which also operates one of the Internet's thirteen authoritative DNS root servers.
A judge initially signed off on this arrangement until March 8 in order to give ISPs sufficient time to identify and notify victims. However, the deadline was later extended by four months.
The replacement servers are now scheduled to be taken offline on July 9, after which time computers still infected with the DNSChanger malware will no longer be able to access the Internet.
The DNSChanger Working Group estimates that there are over 350,000 devices still infected with DNSChanger, out of the 4 million that were originally affected by the malware.
Facebook's decision to notify the owners of the remaining infected computers follows a similar decision by Google, which started alerting DNSChanger victims through its search pages on May 22.
The IBM IoT Cloud Open Platform could ingest and analyze Internet of Things data for enterprises
Avaya has announced a certification program to train professionals in its SDN-Fabric networking architrecture.
Asia Pacific is one of AT&T’s largest and fastest growing regions and India is one of its major markets in the region, says Sandy Verma, Senior Director, IoT Solutions, AT&T APAC.
Hoping to make a mark in the increasingly competitive mobile payment sector, Vodafone will soon let users of its Wallet service pay for goods via contactless terminals with a Visa bank card stored on their Android smartphones.