Security Blog

The latest news and insights from Google on security and safety on the Internet

Notifying users affected by the DNSChanger malware

May 22, 2012
Share on Twitter Share on Facebook
Google

13 comments :

BobintheNOC said...

Obviously, I'll be googling more on dnschanger malware, but any particularly recommended readings that can help us dns and corp admins in identifying infected internal machine? Is there a published list of known proxies that we can search our connectivity logs for?

May 23, 2012 at 1:22 AM
Unknown said...

Here is the link to the FBI's site about this issue.

https://forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS

May 23, 2012 at 4:19 PM
dpeprah said...

Well I am positive my routers are infected since i have checked over and over and reconfigured all the office routers several times and still get the error messages when pcs try to connect to them. How do i rectify this? HELP!!!!!!

May 24, 2012 at 1:01 AM
Anonymous said...

I have the same questions, any one give me the answers?

May 29, 2012 at 3:50 AM
Anonymous said...

dpeprah, may I suggest signing up with OpenDNS? They are great in protecting my network from DNS attacks. http://www.opendns.com/

According dcw.org -- If you think you have been affected by this malware, you do need to fix your computer.  The malware tool kits used that change your computer’s DNS settings are very pervasive.  Initially, the only way researchers could ensure that a machine was fixed was to reformat the hard drive and reinstall the operating system from scratch.

I hope this isn't necessary in your case.

http://www.dcwg.org/fix/

May 29, 2012 at 10:25 PM
Geoffrey said...

OpenDNS is itself arguably an attack -- they document that they redirect all Google traffic to themselves. They also block a host of morally-objectionable sites by default, etc.

June 6, 2012 at 8:56 PM
Wireless.Phil said...

Geoffrey, that depends on how YOU set-it-up.
I use Open DNS and I don't have it block anything morally-objectionable.

July 6, 2012 at 11:35 AM
eingriff said...

The sites to which I am referred to check for DNSChanger indicate that I am "probably" or "most probably" not affected.
I really don't find this very reassuring, but feel incapable of obtaining any greater assurance, so I'm bugging off.

July 6, 2012 at 1:51 PM
Child Fund Shop Online said...

Yes, thanks for this useful information!

August 11, 2012 at 12:26 PM
Anonymous said...

DNS Google , Here is the link to the FBI's site about this issue.

https://forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS

September 11, 2012 at 7:33 PM
Unknown said...

where i can edit my dns code on my ipad?

September 12, 2012 at 10:24 AM
Unknown said...

We came across a few possible infected routers while setting up remote viewing online. What are the symptoms?

March 10, 2013 at 10:16 AM
Unknown said...

I think it was very responsible, and buils possitive company image. Great initiative, and thans of course :)

Regadrs
MG

May 14, 2013 at 10:14 AM

Post a Comment

  

Labels


  • #sharethemicincyber
  • #supplychain #security #opensource
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2024
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2023
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2022
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2021
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2020
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2019
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2018
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2017
    • Dec
    • Nov
    • Oct
    • Sep
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2016
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2015
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2014
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • Apr
    • Mar
    • Feb
    • Jan
  •     2013
    • Dec
    • Nov
    • Oct
    • Aug
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2012
    • Dec
    • Sep
    • Aug
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2011
    • Dec
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
  •     2010
    • Nov
    • Oct
    • Sep
    • Aug
    • Jul
    • May
    • Apr
    • Mar
  •     2009
    • Nov
    • Oct
    • Aug
    • Jul
    • Jun
    • Mar
  •     2008
    • Dec
    • Nov
    • Oct
    • Aug
    • Jul
    • May
    • Feb
  •     2007
    • Nov
    • Oct
    • Sep
    • Jul
    • Jun
    • May

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms