Pages

Thursday 17 May 2012

Infected PCs May Lose Internet Access



Infected PCs to be debarred from Internet Access in coming July


To all the Internet buffs out there, if you are using maliciously infected computers, then get ready to face some real action. Your few mouse clicks may let you lose your internet connection in the coming summers. FBI has decided to take some serious action against servers that allows internet connection for computers which are infected with DNSChanger malware.
FBI shut down massive botnet last year where most of the computers users weren’t even aware that theantivirus software downloaded in their system has been disabled by the malicious software and in result to that, their web surfing speed has been slowed down. Officials later realized catching alone on the botnet won’t work, till they know about the rogue servers who are redirecting the addresses.
The problem actually started when an online advertising scam controlled by international hackers took control of the infected computers, around the globe. They re-routed all the web traffic from infected computers  to fetch in advertising money through these efforts.
Against all these activities, FBI set up a safety net through government computers, few months back, to act against these internet troubles, but later the system had to be shut down.
Presently, in collaboration with its security partner, FBI is requesting internet users to visit a website which will let them know whether their system is infected or not and how to go about the problemFBI has stamped 9 July as the commencing date for barring the infected computers to connect to internet.
FBI officials have said that more than 3, 60,000 users across the world are expected to connect via servers,with alone 85,000 in U.S itself.  These not only include big corporate and government agencies, but majorly victimize personal home computers.

How DNS system works


DNS system is like servers network which translates a web address to a numerical address that is used by computer. DNSChanger malware works by setting a background process in the computer that changes User’s DNS server to Rogue DNS settings. The victim computers are then directed to work as per rogue DNS servers which are programmed by attackers. Ultimately, the computer is directed to a falsified/malicious website.
Intangibly, hackers are able to fetch profits from advertisements that are suspiciously placed on the websites, which compels the users for visiting.  The whole scam which came in the limelight last year, has counted to raise at least $14million dollars, according to FBI sources.

No comments:

Post a Comment

Place To Know