AIRLINK 193.56 Decreased By ▼ -1.27 (-0.65%)
BOP 9.95 Increased By ▲ 0.14 (1.43%)
CNERGY 7.93 Increased By ▲ 0.57 (7.74%)
FCCL 40.65 Increased By ▲ 2.07 (5.37%)
FFL 16.86 Increased By ▲ 0.41 (2.49%)
FLYNG 27.75 Increased By ▲ 0.21 (0.76%)
HUBC 132.58 Increased By ▲ 0.83 (0.63%)
HUMNL 13.89 Increased By ▲ 0.03 (0.22%)
KEL 4.60 Decreased By ▼ -0.06 (-1.29%)
KOSM 6.62 Decreased By ▼ -0.04 (-0.6%)
MLCF 47.60 Increased By ▲ 2.21 (4.87%)
OGDC 213.91 Decreased By ▼ -0.08 (-0.04%)
PACE 6.93 Increased By ▲ 0.07 (1.02%)
PAEL 41.24 Increased By ▲ 1.18 (2.95%)
PIAHCLA 17.15 Increased By ▲ 0.36 (2.14%)
PIBTL 8.41 Increased By ▲ 0.09 (1.08%)
POWER 9.64 Increased By ▲ 0.21 (2.23%)
PPL 182.35 Increased By ▲ 0.16 (0.09%)
PRL 41.96 Increased By ▲ 0.13 (0.31%)
PTC 24.90 Increased By ▲ 0.34 (1.38%)
SEARL 106.84 Increased By ▲ 4.31 (4.2%)
SILK 0.99 Decreased By ▼ -0.01 (-1%)
SSGC 40.10 Increased By ▲ 0.66 (1.67%)
SYM 17.47 Increased By ▲ 0.14 (0.81%)
TELE 8.84 Increased By ▲ 0.08 (0.91%)
TPLP 12.75 No Change ▼ 0.00 (0%)
TRG 66.95 Increased By ▲ 1.55 (2.37%)
WAVESAPP 11.33 Increased By ▲ 0.22 (1.98%)
WTL 1.79 Increased By ▲ 0.09 (5.29%)
YOUW 4.07 Increased By ▲ 0.13 (3.3%)
BR100 12,045 Increased By 70.8 (0.59%)
BR30 36,580 Increased By 433.6 (1.2%)
KSE100 114,038 Increased By 594.4 (0.52%)
KSE30 35,794 Increased By 159 (0.45%)

The so-called Internet doomsday virus with the potential to black out tens of thousands of computers world-wide appeared to pose no major problems on July 9 after a temporary fix expired. Security firms reported no significant outages linked to the DNS Changer virus, as many Internet service providers have either implemented a fix or contacted customers with steps to clean their computers.
The problem stems from malware known as DNS Changer, which was created by cybercriminals to redirect Internet traffic by hijacking the domain name systems (DNS) of Web browsers.
The ring behind the DNS Changer was shut down last year by the US Federal Bureau of Investigation (FBI), Estonian police and other law enforcement agencies, after infecting some four million computers world-wide.
Some 210,000 computers world-wide remained infected as of Sunday, including more than 41,000 in the United States, according to a working group monitoring the problem. On Monday, temporary servers set up by the FBI to direct Internet traffic normally, even for infected computers, were shut down.
But security specialists said most Internet users and providers have had time to work around or fix the problem.
"Although it's not completely over, I think we can count case DNS Changer as a success story, said Mikko Hypponen, chief research officer at the Finland-based firm F-Secure, in a Twitter message.
"Many global operators are keeping their DNS Changer victims online, even after FBI stopped," he said in a separate tweet.
Johannes Ullrich of the SANS Security Institute said that for computers running Windows, the computer "may actually revert to the default settings once the DNS server is turned off."
He added, that "if you used the bad DNS server, chances are that various entities tried to notify you. Google for example should have shown you a banner."
Additionally, Ullrich said the malware is "old enough where antivirus, if you run any, should have signatures for it." Six Estonians and a Russian were charged in Estonia in November with infecting computers, including NASA machines, with the malware as part of an online advertising scam that reaped at least $14 million.
Because the virus controlled so much Internet traffic, authorities obtained a court order to allow the FBI to operate replacement servers until July 9.
The FBI, as well as Facebook, Google, Internet service providers and security firms have been scrambling to warn users about the problem and direct them to fixes.
A DNS Changer Working Group has been monitoring and educating people about the malware, with a website http://www.dcwg.org. FBI spokeswoman Jenny Shearer said the temporary servers were indeed halted and that the agency had no reports of outages. "I'm not aware of any problems," she told AFP.
"If members of the public are not able to use their Internet they should contact their Internet service providers." The working group website said traffic directed to the servers that were under temporary control "will be monitored by several service providers and security organisations to insure they are not maliciously hijacked."
Experts said that if a computer is infected, they could still access the Internet by reconfiguring the way they access the domain name system.
Instead of entering an address such as ebay.com, they could use the underlying address, which is a series of numbers, said Marco Preuss of the Russian security firm Kaspersky on the company's Securelist blog.
"If you know the address of the server you can still use it instead of the name, eg 195.122.169.23 is 'securelist.com' but this is not an easy solution," he said.
Others with more technical savvy can also reprogram their computer's network settings, to access public DNS servers such as one operated by Google.

Copyright Agence France-Presse, 2012

Comments

Comments are closed.