9th July Internet Doom Day, Malware Attack – Protect your System
Yes, 9th July is the Internet Doom Day as DNSchanger malware is going to attack in probably less than 24 hours. DNSChanger Malware is going to affect all the system in the world. More than one in 10 Fortune 500 companies still have computers infected with DNSChanger malware, according to estimates by Internet security firm IID.
History of DNSChanger Malware
DNSchanger is a malware discovered in 2007 which went on to infect millions of computer systems worldwide. It was released by cybercriminals to take control of your web server. The Malware intercepts websites visited by your web browser and redirect you to other sites they had prepared, so you will then use the server under their control. Once you are infected, you are set to use only their server every time you go online. This DNS server will alter every user searches, giving fake and malicious answers as well as promoting fake and dangerous products. It is showing users the altered version of the Internet.
The main idea of this server is so they can easily push web ads to you, earning themselves millions of dollars. You can still surf the Internet like normal if the server keeps running.
How to Find Out If Your System Is Infected
Firstly, you must find out if your system is among the still affected 277,000 systems. Since May 2012, Google has taken the initiative to inform you if they found the DNSChanger Malware in your system, by giving you an alert on their website. When you see the alert, click on the link ‘Learn how to remove this software’ and Google will guide you on the steps to remove the malware.
If you don’t see the warning on Google’s site, you can also visit DCWG’s official website to find out if your system is one of the victim, and if it is, follow the guide to removing it.
Alternatively, There’s action you may need to take even if you’ve checked and your computer is free of the virus. First, go to the FBI site where they check your computer automatically to make sure it doesn’t have the virus itself.
How To Remove DNSChanger Malware
If your have been affected by the DNSChanger Malware, you need to fix your computer system. The only way researchers would suggest to fix your computer is to reformat your hard drive and reinstall the Operating System from scratch. Reverting your OS to a prior backup is not enough since the malware will be able to reclaim your system.
As suggested by DCWG, there are few steps to follow if you are infected:
1. Backup all your important files.
2. Follow the self-help guide as provided by the ‘free tools’ in the list below.
3. Once your computer is clean, follow instructions to ensure your DNS settings are correct.
4. After fixing your computer, make sure your router (if you are using) use the DNS settings provided by the ISP.
5. Changing DNS is only one of the functions of the malware kit. The malware could have captured some of your important information so it is a good idea to check your bank statements and credit reports as well as to take precaution by changing your passwords on any online accounts.
There are a number of free tools with self-help guides available to help you remove the DNSChanger and related threats;
- Hitman Pro (32bit and 64 bit versions)
- Kaspersky Labs TDSSKiller
- Microsoft Windows Defender Offline
- Microsoft Safety Scanner
- Norton Power Eraser
- Trend Micro Housecall
How To Protect Yourself
To learn how to protect yourself from malware infections check out the following web references which guide you in protecting yourself from DNSChanger and many other Malware.