Embark on a journey of knowledge! Take the quiz and earn valuable credits.
Take A QuizChallenge yourself and boost your learning! Start the quiz now to earn credits.
Take A QuizUnlock your potential! Begin the quiz, answer questions, and accumulate credits along the way.
Take A QuizPlease log in to access this content. You will be redirected to the login page shortly.
LoginOther Computer News in Other . 3 years ago
Quote from: DragonMaster Jay on July 07, 2012, 02:03:30 AM
Whomever is keeping the DNSChanger botnet alive is being tracked down.
Update on March 12, 2012: To assist victims affected by the DNSChanger malicious software, the FBI obtained a court order authorizing the Internet Systems Consortium (ISC) to DEPLOY and maintain temporary clean DNS servers. This solution is temporary, providing additional time for victims to clean affected computers and restore their normal DNS settings. The clean DNS servers will be turned off on July 9, 2012, and computers still impacted by DNSChanger may lose Internet connectivity at that time.
Check your computer here: http://www.dns-ok.us/Works for me. Recommended.I'm unsure how the "DNS check" tool could not work in this case; I believe it is as simple as determining if DNS requests get sent to the IP's that are now controlled by the FBI. This would cover maliciously changed DNS settings in both the router (via changing DNS settings from the typical default of DHCP acquired) and the machine itself (via the hosts file).
The FBI is in control of the malicious servers. They are taking the temporary clean servers offline and it will result in those still infected to loose Internet access.That still doesn't stop other blackhats/hackers from uploading mutated versions (of the rootkit) and distributing them in a different botnet. There could be double-agent activity going on!
I'm unsure how the "DNS check" tool could not work in this case; I believe it is as simple as determining if DNS requests get sent to the IP's that are now controlled by the FBI. This would cover maliciously changed DNS settings in both the router (via changing DNS settings from the typical default of DHCP acquired) and the machine itself (via the hosts file).
Routers cannot be 'infected' per se (well, they can, by forcing a malicious firmware to them, but since that differs between models and is rather involved it's not really as economic from the malicious authors point of view as just fiddling with the settings. Also, in that case a reset wouldn't resolve the problem either, since it just wipes the settings memory, and the malicious code would remain. so thank goodness for that.
I don't know the technical information about DNS changer and how precisely it works particularly with regard to routers, but it's reasonable to assume it only works on a subset of routers, likely chosen to maximize the ability of the trojan to change settings by targeting popular routers. Each one would need to be dealt with "specially" by the trojan, since each one has a different web interface, so it needs to know the sequence of http requests to send to the device in order to change the DNS settings.
I believe google and facebook warn users whose DNS is redirected as well, though I cannot find any confirmation on that. If so, I would imagine most of the less tech savvy use at least one of those sites, which means that they have essentially ignored warnings telling them what is going to happen anyway.
BC, There is a list of the bad DNS IPs. You could set your DNS to use one of them. Then when you run the test given above you will get a red flag. The 'BAD' DNS are now controlled by the FBI, so they are harmless, but they will trigger the warning when you do then test.
If you go to the check using good DNS, you get the green page. If you go to the site via a BAD DNS you will be directed to the red page. That is what DNS redirection is all about anyway. At any moment in time, not all DNS sites are in sync.
Early versions of DNSChanger are still using the IPs that the FBI now controls.
It is kind of hard to explain this in layman terms. In effect, the FBI highjacked the DNS IPs from the cyber criminals.
Posted on 18 May 2022, this text provides information on Other related to Computer News in Other. Please note that while accuracy is prioritized, the data presented might not be entirely correct or up-to-date. This information is offered for general knowledge and informational purposes only, and should not be considered as a substitute for professional advice.
Turn Your Knowledge into Earnings.
No matter what stage you're at in your education or career, TuteeHub will help you reach the next level that you're aiming for. Simply,Choose a subject/topic and get started in self-paced practice sessions to improve your knowledge and scores.
Ready to take your education and career to the next level? Register today and join our growing community of learners and professionals.