DNSChanger Malware last call for detection and repairs
US-CERT Current Activity
Original release date: Tuesday, April 24, 2012 at 2:20 pm
Last revised: Tuesday, April 24, 2012 at 2:20 pm
US-CERT encourages users and administrators to ensure their systems are
not infected with the DNSChanger malware by utilizing tools and
resources available at the DNS Changer Working Group (DCWG) website.
Computers testing positive for infection of DNSChanger malware will need
to be cleaned of the malware in order to maintain continued internet
connectivity beyond July 9, 2012.
On November 8, 2011, the FBI, NASA-OIG, and Estonian police arrested
several cyber criminals in "Operation Ghost Click." The criminals
operated under the company name "Rove Digital," and distributed DNS
changing viruses, variously known as TDSS, Alureon, TidServ, and TDL4
Additional information about Operation Ghost Click and the DNSChanger
malware is available at the FBI website.
Re: DNSChanger Malware last call for detection and repairs
didnt they say the same thing like 4 months ago.....i mean i know malware is easy to change once ya get it. but i could of swore they said they were gona make the new year a little less bright (he he dumb pun i know)