Security Blog

The latest news and insights from Google on security and safety on the Internet

Notifying users affected by the DNSChanger malware

22 May 2012
Share on Twitter Share on Facebook
Google

13 comments :

BobintheNOC said...

Obviously, I'll be googling more on dnschanger malware, but any particularly recommended readings that can help us dns and corp admins in identifying infected internal machine? Is there a published list of known proxies that we can search our connectivity logs for?

23 May 2012 at 01:22
Unknown said...

Here is the link to the FBI's site about this issue.

https://forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS

23 May 2012 at 16:19
dpeprah said...

Well I am positive my routers are infected since i have checked over and over and reconfigured all the office routers several times and still get the error messages when pcs try to connect to them. How do i rectify this? HELP!!!!!!

24 May 2012 at 01:01
Anonymous said...

I have the same questions, any one give me the answers?

29 May 2012 at 03:50
Anonymous said...

dpeprah, may I suggest signing up with OpenDNS? They are great in protecting my network from DNS attacks. http://www.opendns.com/

According dcw.org -- If you think you have been affected by this malware, you do need to fix your computer.  The malware tool kits used that change your computer’s DNS settings are very pervasive.  Initially, the only way researchers could ensure that a machine was fixed was to reformat the hard drive and reinstall the operating system from scratch.

I hope this isn't necessary in your case.

http://www.dcwg.org/fix/

29 May 2012 at 22:25
Geoffrey said...

OpenDNS is itself arguably an attack -- they document that they redirect all Google traffic to themselves. They also block a host of morally-objectionable sites by default, etc.

6 June 2012 at 20:56
Wireless.Phil said...

Geoffrey, that depends on how YOU set-it-up.
I use Open DNS and I don't have it block anything morally-objectionable.

6 July 2012 at 11:35
eingriff said...

The sites to which I am referred to check for DNSChanger indicate that I am "probably" or "most probably" not affected.
I really don't find this very reassuring, but feel incapable of obtaining any greater assurance, so I'm bugging off.

6 July 2012 at 13:51
Child Fund Shop Online said...

Yes, thanks for this useful information!

11 August 2012 at 12:26
Anonymous said...

DNS Google , Here is the link to the FBI's site about this issue.

https://forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS

11 September 2012 at 19:33
Unknown said...

where i can edit my dns code on my ipad?

12 September 2012 at 10:24
Unknown said...

We came across a few possible infected routers while setting up remote viewing online. What are the symptoms?

10 March 2013 at 10:16
Unknown said...

I think it was very responsible, and buils possitive company image. Great initiative, and thans of course :)

Regadrs
MG

14 May 2013 at 10:14

Post a Comment

  

Labels


  • #sharethemicincyber
  • #supplychain #security #opensource
  • android
  • android security
  • android tr
  • app security
  • big data
  • biometrics
  • blackhat
  • C++
  • chrome
  • chrome enterprise
  • chrome security
  • connected devices
  • CTF
  • diversity
  • encryption
  • federated learning
  • fuzzing
  • Gboard
  • google play
  • google play protect
  • hacking
  • interoperability
  • iot security
  • kubernetes
  • linux kernel
  • memory safety
  • Open Source
  • pha family highlights
  • pixel
  • privacy
  • private compute core
  • Rowhammer
  • rust
  • Security
  • security rewards program
  • sigstore
  • spyware
  • supply chain
  • targeted spyware
  • tensor
  • Titan M2
  • VDP
  • vulnerabilities
  • workshop


Archive


  •     2025
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2024
    • Dec
    • Nov
    • Oct
    • Sept
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2023
    • Dec
    • Nov
    • Oct
    • Sept
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2022
    • Dec
    • Nov
    • Oct
    • Sept
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2021
    • Dec
    • Nov
    • Oct
    • Sept
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2020
    • Dec
    • Nov
    • Oct
    • Sept
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2019
    • Dec
    • Nov
    • Oct
    • Sept
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2018
    • Dec
    • Nov
    • Oct
    • Sept
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2017
    • Dec
    • Nov
    • Oct
    • Sept
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2016
    • Dec
    • Nov
    • Oct
    • Sept
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2015
    • Dec
    • Nov
    • Oct
    • Sept
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2014
    • Dec
    • Nov
    • Oct
    • Sept
    • Aug
    • Jul
    • Jun
    • Apr
    • Mar
    • Feb
    • Jan
  •     2013
    • Dec
    • Nov
    • Oct
    • Aug
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2012
    • Dec
    • Sept
    • Aug
    • Jun
    • May
    • Apr
    • Mar
    • Feb
    • Jan
  •     2011
    • Dec
    • Nov
    • Oct
    • Sept
    • Aug
    • Jul
    • Jun
    • May
    • Apr
    • Mar
    • Feb
  •     2010
    • Nov
    • Oct
    • Sept
    • Aug
    • Jul
    • May
    • Apr
    • Mar
  •     2009
    • Nov
    • Oct
    • Aug
    • Jul
    • Jun
    • Mar
  •     2008
    • Dec
    • Nov
    • Oct
    • Aug
    • Jul
    • May
    • Feb
  •     2007
    • Nov
    • Oct
    • Sept
    • Jul
    • Jun
    • May

Feed

Follow
Give us feedback in our Product Forums.
  • Google
  • Privacy
  • Terms