X

Web users beware: DNSChanger victims lose Web access July 9

On that day, the FBI will be shutting down the temporary DNS servers it used to assist DNSChanger victims.

Don Reisinger
CNET contributor Don Reisinger is a technology columnist who has covered everything from HDTVs to computers to Flowbee Haircut Systems. Besides his work with CNET, Don's work has been featured in a variety of other publications including PC World and a host of Ziff-Davis publications.
Don Reisinger

If you're one of thousands of people infected with the DNSChanger malware, get rid of it before Monday.

On July 9, the FBI will be switching off servers it used to keep those infected with the malware on the Internet. The organization says maintaining the servers is costly and that therefore the agency won't extend its support.

DNSChanger was first discovered in 2007 and was found to have infected millions of computers worldwide. The payload effectively modified a computer's DNS settings to redirect traffic through its rogue servers. When users typed in a domain name in a browser, the servers would direct them to other sites for the creators' financial gain.

Late last year, the FBI disrupted the crime ring and converted the rogue servers to clean servers to give infected users time to fix their systems. A host of tools and techniques have surfaced for removing the malware, but thousands of machines are still affected. If DNSChanger is not removed from those computers, users won't be able to connect to the Internet.

So, before that happens, Web users are encouraged to head over to a special DNSChanger Web site, DCWG.org, to see how to fix the problem. Several security firms, including McAfee and Trend Micro, also have free tools available to remove DNSChanger.