If you use default passwords on your home or office gateway/router, then you maybe at risk from the DNSChanger malware. This can affect how your computers translate domain names such as apple.com, microsoft.com and other domain names to the unique Internet Protocol (IP) address such as 198.51.100.1 that we ultimately depend on to access other computers. A company in Estonia called Rove Digital has been operating since 2007 and may have affected more that 500,000 computers in the United States alone. If your computer is affected, it will fail to access the Internet after July 9, 2012.
The Domain Name System (DNS) is a critical Internet service that converts user-friendly domain names, such as www.fbi.gov, into numerical addresses that allow computers to talk to each other. Without DNS and the DNS servers operated by Internet service providers, computer users would not be able to browse websites or send e-mail.
DNSChanger malware causes a computer to use rogue DNS servers in one of two ways.
- The malware changes the computer’s DNS server settings to replace the ISP’s good DNS servers with rogue DNS servers operated by the criminal.
- The malware attempts to access devices on the victim’s small office/home office (SOHO) network that run a dynamic host configuration protocol (DHCP) server (eg. a router or home gateway). The malware attempts to access these devices using common default usernames and passwords and, if successful, changes the DNS servers these devices use from the ISP’s good DNS servers to rogue DNS servers operated by the criminals. This is a change that may impact all computers on the SOHO network, even if those computers are not infected with the malware.
To assist victims affected by the DNSChanger malicious software, the FBI obtained a court order authorizing the Internet Systems Consortium (ISC) to deploy and maintain temporary clean DNS servers. This solution is temporary, providing additional time for victims to clean affected computers and restore their normal DNS settings. The clean DNS servers will be turned off on July 9, 2012, and computers still impacted by DNSChanger may lose Internet connectivity at that time.
The following table list sites setup to help you determine if your computer is affected.
|English||DNS Changer Working Group (DCWG)|
Bundesamt für Sicherheit in der Informationstechnik (BSI)
For more technically oriented people the following is a list of IP address the criminals used for their activities.
List of Rogue DNS Server Addresses
- 220.127.116.11 through 18.104.22.168
- 22.214.171.124 through 126.96.36.199
- 188.8.131.52 through 184.108.40.206
- 220.127.116.11 through 18.104.22.168
- 22.214.171.124 through 126.96.36.199
- 188.8.131.52 through 184.108.40.206
For more information see the following links:
Update 2015-01-02: Many sites linked from this page are no longer available.