If you're one of thousands of people infected with the DNSChanger malware, get rid of it before Monday.
On July 9, theit used to keep those infected with the malware on the Internet. The organization says maintaining the servers is costly and that therefore the agency won't extend its support.
DNSChanger was first discovered in 2007 and was found to have infected millions of computers worldwide. The payload effectively modified a computer's DNS settings to redirect traffic through its rogue servers. When users typed in a domain name in a browser, the servers would direct them to other sites for the creators' financial gain.
Late last year, the FBI disrupted the crime ring and converted the rogue servers to clean servers to give infected users time to fix their systems. A host of tools and techniques have surfaced for removing the malware, but thousands of machines are still affected. If DNSChanger is not removed from those computers, users won't be able to connect to the Internet.
So, before that happens, Web users are encouraged to head over to a special DNSChanger Web site, DCWG.org, to see how to fix the problem. Several security firms, including McAfee and Trend Micro, also have free tools available to remove DNSChanger.