Facebook Starts Notifying DNSChanger Victims
Facebook alerts owners of DNSChanger-infected computers that they need to take action before July 9
As a result of our work with the group (DNSChanger Working Group), Facebook is now able to notify users likely infected with DNSChanger malware and direct them to instructions on how to clean their computer or networksFacebook security team
Facebook has started notifying victims of the DNSChanger malware who visit the social networking site that their computers will be cut off from the Internet on July 9, if they don't clean them until that time.
Facebook's DNSChanger alerts will include a link the DNSChanger Working Group's website, which contains more information about the malware and instructions on how to remove it.
"Earlier this year, Facebook joined the clean up effort by participating in [DNSChanger Working Group], which is comprised of computer security experts from the public, private, and academic sectors," the Facebook security team said in a blog post on Monday. "As a result of our work with the group, Facebook is now able to notify users likely infected with DNSChanger malware and direct them to instructions on how to clean their computer or networks."
DNSChanger is a family of Trojan programs that hijack Web search queries, display malicious advertisements and redirect users to fake websites. They do this by forcing infected computers to use DNS servers controlled by attackers.
DNS servers play a very important role on the Internet -- they translate domain names into numerical Internet Protocol (IP) addresses that computers use to communicate with each other. By default, most computers use DNS servers operated by their respective Internet service providers (ISPs) -- entities that are implicitly trusted with routing their connections.
DNSChanger is a family of Trojan programs that hijack Web search queries, display malicious advertisements and redirect users to fake websites
The FBI shut down the DNSChanger operation in November 2011 following a two-year investigation and temporary replaced the rogue DNS servers with legitimate ones. The replacement servers are operated by a non-profit organization called the Internet Systems Consortium, which also operates one of the Internet's thirteen authoritative DNS root servers.
A judge initially signed off on this arrangement until March 8 in order to give ISPs sufficient time to identify and notify victims. However, the deadline was later extended by four months.
The replacement servers are now scheduled to be taken offline on July 9, after which time computers still infected with the DNSChanger malware will no longer be able to access the Internet.
The DNSChanger Working Group estimates that there are over 350,000 devices still infected with DNSChanger, out of the 4 million that were originally affected by the malware.
Facebook's decision to notify the owners of the remaining infected computers follows a similar decision by Google, which started alerting DNSChanger victims through its search pages on May 22.
India based global trade company Nasscom launched a task force which aims to turn India into the hub for cyber security related research, training and products.
EMC is purchasing the privately held Virtustream software provider for approximately US$1.2 billion to expand its portfolio of cloud management tools.
The number of people using the Internet is growing at a steady rate, but 4.2 billion out of 7.4 billion will still be offline by the end of the year.
Building on its support for the OpenStack open source cloud computing platform, IBM this week unveiled a new slate of IBM Cloud OpenStack Services intended to help clients and developers integrate applications and data across hybrid clouds -- including public, private and local cloud environments.