Last call aired for Pinoy PC users to check DNS malware

Share on facebook
Share on twitter
Share on linkedin
Share on email

Telco giants PLDT and Globe Telecom warned that PC users may lose their Internet access on Monday if they fail to take action on time. DNSChanger is a globally distributed malware) created in 2007 by a group of Internet hackers. It modifies the Domain Name Server (DNS) settings of an infected computer and diverts users of these computers to servers owned by the hackers instead of accessing the servers of the real websites. The hackers are thus able to display advertisements of fake or malicious products and direct victims to websites which are also infected with other malware. In 2011, law enforcement agencies from around the world arrested the group behind DNSChanger. To counteract its initial effects, malicious DNS servers were shut down and alternate DNS servers were set up to temporarily replace the malicious servers and give people time to clean up the infection. However, on July 9, 2012, these temporary servers will be shut down rendering computers still infected with DNSChanger unable to access Internet services. Internet subscribers can check their computers to determine if their devices are infected with the malware. They can do this by following these steps provided by the DNS Changer Working Group (DCWG):

Manual Checking/Detection Windows 1. Click Start 2. Open the Command Window . (For Windows 7) Type cmd at the search bar . (For Windows XP) Click Run, then type cmd at the bar 3. Type ipconfig /all 4. Search for the DNS Servers section Mac OS X 1. Click the Apple icon an the top left of the screen 2. Select System Preferences 3. Locate the “Network” icon 4. Read the “DNS Server” line Ensure that the DNS Servers are not within the following range of Internet Protocols (IPs): . 85.255.112.0 through 85.255.127.255 . 67.210.0.0 through 67.210.15.255 . 93.188.160.0 through 93.188.167.255 . 77.67.83.0 through 77.67.83.255 . 213.109.64.0 through 213.109.79.255 . 64.28.176.0 through 64.28.191.255 If the DNSChanger is detected, users may then use any of the following software to clean the infection: . Hitman Pro (32bit and 64bit versions) http://www.surfright.nl/en/products/ . Kaspersky Labs TDSSKiller http://support.kaspersky.com/faq/?qid=208283363 . McAfee Stinger http://www.mcafee.com/us/downloads/free-tools/stinger.aspx . Microsoft Windows Defender Offline http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline . Microsoft Safety Scanner http://www.microsoft.com/security/scanner/en-us/default.aspx . Norton Power Eraser http://security.symantec.com/nbrt/npe.aspx . Trend Micro Housecall http://housecall.trendmicro.com . MacScan http://macscan.securemac.com/ . Avira’s DNS Repair-Tool http://www.avira.com/en/support-for-home-knowledgebase-detail/kbid/1199 Alternatively, subscribers may also visit the following sites to their system checked automatically . http://www.dns-ok.us/ . http:// dnschanger.detect.my
For more information on DNSChanger, visit the official DCWG website at www.dcwg.org ]]>

Facebook Comments

Join Our Newsletter! Zero spam, unsubscribe anytime!






Latest Posts

Archives