CERT mailing list archives

Current Activity - DNSChanger Malware


From: Current Activity <us-cert () us-cert gov>
Date: Tue, 24 Apr 2012 14:35:26 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

US-CERT Current Activity

DNSChanger Malware

Original release date: Tuesday, April 24, 2012 at 2:20 pm
Last revised: Tuesday, April 24, 2012 at 2:20 pm


US-CERT encourages users and administrators to ensure their systems are
not infected with the DNSChanger malware by utilizing tools and
resources available at the DNS Changer Working Group (DCWG) website.
Computers testing positive for infection of DNSChanger malware will need
to be cleaned of the malware in order to maintain continued internet
connectivity beyond July 9, 2012.

On November 8, 2011, the FBI, NASA-OIG, and Estonian police arrested
several cyber criminals in "Operation Ghost Click." The criminals
operated under the company name "Rove Digital," and distributed DNS
changing viruses, variously known as TDSS, Alureon, TidServ, and TDL4
viruses.

Additional information about Operation Ghost Click and the DNSChanger
malware is available at the FBI website.

Relevant Url(s):
<http://www.dcwg.org/>

<http://www.fbi.gov/news/stories/2011/november/malware_110911>


____________________________________________________________________

   Produced by US-CERT, a government organization.
____________________________________________________________________

This product is provided subject to the Notification as indicated here:
http://www.us-cert.gov/legal.html#notify

This document can also be found at
http://www.us-cert.gov/current/#dnschanger_malware

For instructions on subscribing to or unsubscribing from this
mailing list, visit http://www.us-cert.gov/cas/signup.html

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBT5byZD/GkGVXE7GMAQI7/Af/TYNZRXHzL7NnmKXHS11MKNLqXeAsGsXG
JpDmQN1tAC6wABTQaw6QLju1xUWVcY04HnrEifVQqwzvcmsPoDEDd25vu5NBGAhc
OYk5vie2ieB0brO8kEMxGHg22UEkJ934+tRZ10b6Y99CrWr1VGjJWKqWJEZDBaDH
cwbpz/avGa+v7otohqSCRFCoKs39BN6PAS+Fe9qoc4vAkvAdNgajGtGKsgL5MIq1
j5Io68eH7UmpjzYlqaQjhc0H02mexUB0QADnXWVghMQrTln/2JXc1Dqeh+GWxhy/
uAWqsheO4WLGNtkNJuuHeUxmMVn7HPuoEHDS3nJ9ekxD6KdlbYN6dg==
=K6Hr
-----END PGP SIGNATURE-----


Current thread: