Everything Amazon Announced Amazon Kindle Scribe Amazon Halo Rise Amazon Fire TV Omni QLED Prime Day 2: Oct. 11-12 Asteroid Crash Site Inside Hurricane Ian's Eye Refurb Roombas for $130
Want CNET to notify you of price drops and the latest stories?
No, thank you

Web users beware: DNSChanger victims lose Web access July 9

On that day, the FBI will be shutting down the temporary DNS servers it used to assist DNSChanger victims.

If you're one of thousands of people infected with the DNSChanger malware, get rid of it before Monday.

On July 9, the FBI will be switching off servers it used to keep those infected with the malware on the Internet. The organization says maintaining the servers is costly and that therefore the agency won't extend its support.

DNSChanger was first discovered in 2007 and was found to have infected millions of computers worldwide. The payload effectively modified a computer's DNS settings to redirect traffic through its rogue servers. When users typed in a domain name in a browser, the servers would direct them to other sites for the creators' financial gain.

Late last year, the FBI disrupted the crime ring and converted the rogue servers to clean servers to give infected users time to fix their systems. A host of tools and techniques have surfaced for removing the malware, but thousands of machines are still affected. If DNSChanger is not removed from those computers, users won't be able to connect to the Internet.

So, before that happens, Web users are encouraged to head over to a special DNSChanger Web site, DCWG.org, to see how to fix the problem. Several security firms, including McAfee and Trend Micro, also have free tools available to remove DNSChanger.