DNSChanger Danger: Damned if you do, Damned if you don’t

How much warning is too much warning? At what point does an excess of caution evolve into fear, uncertainty and doubt? That the DNSChanger malware failed to down internet connections across the globe on Monday, despite increasingly shrill warnings that the FBI was preparing to pull the plug on the temporary servers keeping them afloat, is undoubtedly A Good Thing. However, it highlights one of the persistent issues facing computing: the challenges in balancing caution and panic.

DNSChanger was undoubtedly a high-risk issue, certainly before the FBI weighed in. The trojan changed user DNS settings so as to rely on compromised servers, serving up pages with malware, sites that secretly collected user-data, and adverts for fake products. The FBI seized the network and a temporary – and safe – DNS replacement system was set up for those unknowingly relying on the dangerous one.

All good things must come to an end, though, and on July 9 the FBI’s mandate to run the replacement servers ran out. With hundreds of thousands of computers still relying on the makeshift DNS provisions to bridge browsers and sites, that meant warning those users that they’d need to take an active role in their system security if they wanted to stay online.

“We lack a single point of communication – instead we have a hosepipe of hysteria”

Problem is, the sort of users who were inadvertently infected and didn’t realize might not be the sort who would also go hunting for the latest news in malware. What we lack is a single point of communication to highlight security problems; instead, we have a pretty much all-or-nothing hosepipe of rising hysteria.

Microsoft has attempted something like that single point, with its Security Center in Windows. Apple, late to the game when it comes to malware and virus threats, hasn’t a centralized security hub in OS X, though the company has been doing more to prevent insidious apps working their way into the platform.

Windows Security Center is too easily overlooked. Third-party security firms individually push alerts to their blogs – and to their (generally paid) software packages – but there’s no all-inclusive feed that distills all of that to the user’s desktop in an easily understood way.

It’s a problem with no easy solution. In the aftermath of the DNSChanger anticlimax, there’s likely to be no shortage of accusations that the malware was “over-hyped” and its potential impact “overstated” so as to drive pageviews. Still, while we’ve gotten off easy now – a somewhat breathless and clogged news-cycle notwithstanding – there’s the distinct possibility that the next big security crisis could be made exponentially worse when contingency gives way to uncontrollable FUD and users’ eyes glaze over.


DNSChanger Danger: Damned if you do, Damned if you don’t is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Google disputes claims of Android botnet

Android logoLast week, a Microsoft researcher claimed to have discovered an Android botnet, but it looks like it might not exist after all. According to a statement from Google, their analysis suggests that spammers are using infected computers and a fake mobile signature to bypass anti-spam mechanisms in the email platform they’re using.

In response, the author of the original post about the Android botnet wrote a follow-up post saying that Google’s suggestions could be correct, but the idea of an Android-based botnet shouldn’t be discounted either. Regardless of which theory is accurate – users should be careful about what they download anyway – either on their PCs or Android phones. Read up more about Google’s dispute here.

By Ubergizmo. Related articles: Android malware disguised as Google+ app, Android malware DroidDream Light spotted over the weekend,

Internet goes offline for thousands as DNSChanger cleanup peaks

Thousands of internet users are waking up to no web connection this morning, with the temporary servers handling those infected by DNSChanger being shut down. ISPs and the FBI had warned surfers that, had their DNS settings been changed by the malware, they would lose access to the workaround fix that had been in operation for the past few months. Estimates of how many people will be impacted today are unclear, with the numbers of those relying on the most active servers last month exceeding 100,000.

In fact, according to the DNSChanger Working Group, the team established to handle the fall-out of the malware, back on June 13 there were 135,331 unique IPs accessing the top 25 replacement servers. Since then there has been a sizable outreach campaign as ISPs and others attempt to warn those users affected. In late May, around 330,000 systems were believed to be infected.

DNSChanger was a trojan that changed DNS settings – the links to servers which point browsers in the right direction for the sites you request – to alternative, compromised ones. Control of those sites allowed the malware operators to collect user data, show adverts for fake products and otherwise manipulate the internet experience.

Thankfully, the method of cleaning up a DNSChanger infection has improved since the early days, when a complete reinstallation of the OS – whether Windows or OS X – was required. Now, there’s a simple set of tools which do it without all of that headache, though it’s still advisable to run a full backup of personal files beforehand, just in case.

If you’re reading this (and you’ve not been forced to turn to a smartphone or tablet with your regular computer refusing to load sites) then you’re okay, but stand-by for parents and friends who may have complaints.


Internet goes offline for thousands as DNSChanger cleanup peaks is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


PSA: Evict DNSChanger now or lose the web Monday

Today’s malware has a deadline: get rid of DNSChanger now, or come Monday, July 9, you may find yourself without access to the internet altogether. Hundreds of thousands of computers around the world have been infected by the trojan, which changes DNS settings – among other things – so as to route web traffic through compromised servers. Now, the FBI is preparing to pull the plug on those servers – and many people’s internet connection with them.

Since the FBI and other law enforcement agencies seized control of the botnet behind DNSChanger, a temporary DNS server network has been running in its stead so as to keep infected users online. That network will cease operating on Monday.

“The botnet operated by Rove Digital altered user DNS settings, pointing victims to malicious DNS in data centers in Estonia, New York, and Chicago. The malicious DNS servers would give fake, malicious answers, altering user searches, and promoting fake and dangerous products. Because every web search starts with DNS, the malware showed users an altered version of the Internet” DNSChanger Working Group

The best news is, checking for a DNSChanger infection on your system and, if found, getting rid of it is straightforward. First step is heading to dns-ok.us in your browser: that will tell you whether or not there’s a sign that your computer has been infected. If it’s green, you’re in the clear (though it’s probably still worth forwarding this article on to friends and family – particularly net-confused parents – who might need some assistance checking their own machines).

If it’s red, however, you have a DNSChanger problem. Thankfully there are multiple options to get rid of it: Microsoft has a tool, as do key anti-virus vendors such as McAfee and Norton. There’s a full list of them here, and usually it’s just a case of downloading and running an app to get your computer back on an even keel.


PSA: Evict DNSChanger now or lose the web Monday is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Your Internet Might Shut Off Tomorrow Because of a Virus—Here’s How to Fix It [Video]

Tonight at 12:01 AM EDT Monday July 9th, the Internet is going to become inaccessible for nearly half a million people around the world because of malware called DNS Changer. If your computer is infected with DNS Changer, it won’t be able to get on the Internet anymore. Here’s how to get rid of it and make sure the Internet still works for you. More »

DNSChanger malware for dummies: Sophos video explains it all

Today the folks at the security group Sophos have released a simple “how to” video on the DNSChanger (or DNS Changer, if you prefer) Malware, showing how you can avoid losing your internet connection on July 9th. This information has been published by us before in the post DNSChanger: How to find it and how to fix it earlier this week, but for those of you that prefer a simple explanatory video instead, today we’ve got that for you as well.

The video starts back in 2007 when the DNSChanger Malware first started, it then being a bit more simple than it is today, looking for your internet settings, guessing your password, and doing general mayhem. They also started a company called Rove Digital, got a whole bunch of DNS servers to process their code magic. The FBI got involved in the situation several years ago and they did bust in on the devils and take control of their servers, but not before the bad guys got millions of dollars from their deeds.

Then is when the good stuff starts.

Intelligently quoting the undeniably great Marcus Antonius from all the way back in 44BC, the folks at Sophos explain how you could still be affected by the DNSChanger Malware from back then even if you are no longer infected.

“The evil that men do lives after them. The good is oft interred with their bones.” – Marcus Antonius, 44BC

Hundreds of thousands of computers could very well still be affected – and at risk of certain doom – if figures shown by the DNSChanger Working Group are true, of course. The part where this gets REALLY good is here: the FBI’s authority to run the interim servers taken from the crooks that were caught sever years ago ends on Monday the 9th of July, 2012. If you have not fixed your computer (assuming it was infected in the first place) by then, you will get knocked off the web.

The video above goes through several ways that you might protect yourself against the evil that could very well be running through your computer right this minute, and again you can also check our DNSChanger: How to find it and how to fix it guide if you get lost. Both work!


DNSChanger malware for dummies: Sophos video explains it all is written by Chris Burns & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Malware Botnet may have framed Android

Android may have been wrongly maligned for its role in a malware botnet, security researchers have admitted, with findings that devices running Google’s software could be responsible for spam potentially fooled by a fake email signature. Despite claims from Sophos and Microsoft earlier this week that email header information pinned down Android devices as the guilty carriers, each has since backtracked having conceded that Android’s involvement is in no way certain.

“It’s entirely possible that bot on a compromised PC connected to Yahoo Mail, inserted the the message-ID thus overriding Yahoo’s own Message-IDs and added the “Yahoo Mail for Android” tagline at the bottom of the message all in an elaborate deception to make it look like the spam was coming from Android devices” Microsoft  engineer Terry Zink wrote in a follow-up to his earlier comments on the botnet. However, the security researcher still isn’t willing to let Android off the hook.

“On the other hand, the other possibility is that Android malware has become much more prevalent and because of its ubiquity, there is sufficient motivation for spammers to abuse the platform. The reason these messages appear to come from Android devices is because they did come from Android devices” Zink theorized. “Before writing my previous post, I considered both options but selected the latter.”

As for Sophos, senior security adviser Chester Wisniewski has confirmed he is rechecking the company’s own findings to see if a fake signature could be responsible for mistaken identity. “We don’t know for sure that it’s coming from Android devices” Wisniewski said on Thursday, though went on to maintain that in his belief it is a botnet running on Android phones rather than something else.

“We either have a new PC botnet that is exploiting Yahoo!’s Android APIs or we have mobile phones with some sort of malware that uses the Yahoo! APIs for sending spam messages” the researcher wrote. “One of the interesting data points supporting the argument that this is new Android malware is the unusually large number of the originating IPs on cellular networks.”

Google, meanwhile, continues to protest Android’s innocence. “The evidence we’ve examined does not support the Android botnet claim” a company spokesperson said. “Our analysis so far suggests that spammers are using infected computers and a fake mobile signature to try to bypass anti-spam mechanisms in the email platform they’re using. We’re continuing to investigate the details.”

[via WSJ]


Malware Botnet may have framed Android is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Spam-happy iOS trojan slips into App Store, gets pulled in rapid fashion

Spamhappy iOS trojan slips into App Store, gets pulled in rapid fashion

You could call it technological baptism of sorts… just not the kind Apple would want. A Russian scam app known as Find and Call managed to hit the App Store and create havoc for those who dared a download, making it the first non-experimental malware to hit iOS without first needing a jailbreak. As Kaspersky found out, it wasn’t just scamware, but a trojan: the title would swipe the contacts after asking permission, send them to a remote server behind the scenes and text spam the daylights out of any phone number in that list. Thankfully, Apple has already yanked the app quickly and explained to The Loop that the app was pulled for violating App Store policies. We’d still like to know just why the app got there in the first place, but we’d also caution against delighting in any schadenfreude if you’re of the Android persuasion. The app snuck through to Google Play as well, and Kaspersky is keen to remind us that Android trojans are “nothing new;” the real solution to malware is to watch out for fishy-looking apps, no matter what platform you’re using.

[Image credit: C Jones Photography (wallpaper)]

Spam-happy iOS trojan slips into App Store, gets pulled in rapid fashion originally appeared on Engadget on Thu, 05 Jul 2012 17:29:00 EDT. Please see our terms for use of feeds.

Permalink MacRumors  |  sourceKaspersky, The Loop  | Email this | Comments

Apple App Store’s first spam sending app pulled

Find and CallAfter being reported for pushing out corrupted updates, it looks like the Apple App Store is in the news again. According to reports online, “Find and Call”, the first ever spam-sending app managed to make its way onto the Apple App store. The app reportedly uploads all of a user’s contacts to a remote server and then sends a text message and email to every contact in his/her phonebook. Ouch.

The app also made it into the Google Play Store – no surprise there, since Google doesn’t screen what goes on it but this is the first time that a malicious app has managed to slip through Apple’s strict screening policies. As of now, the app is nowhere to be found on the Apple App Store and Google Play Store. While it may be the first app to successfully use user data in a malicious manner on the App Store, it’s probably not going to be the last app to do so. Hopefully Apple beefs up its app moderation to prevent such mishaps from happening in the future.

By Ubergizmo. Related articles: Apple changes return App Store return policy in Taiwan, Android botnet discovered,

DNSChanger: How to find it and how to fix it

Time is running out for computers running the DNSChanger malware, with the FBI planning to cut infected machines off from the internet teat come Monday, but how do you know if your system is at risk? The malware reroutes internet traffic through compromised servers, opening systems up to the dangers of keylogging, pushing fake software and products, and otherwise manipulating the web experience. Thankfully, checking out the status of your computer isn’t hard.

According to the DNSChanger Working Group established to address the problem, there are still a huge number of computers showing signs of badly routed DNS. The court order allowing the FBI to shut down the fake DNS servers on Monday will potentially mean hundreds of thousands of systems are left unable to look up sites.

Actually finding out whether you’re infected is a simple matter of visiting a checking site. Go to dns-ok.us in your browser, and if the background is green then your computer’s DNS settings are good. If it’s red, however, then you will need to go through some clean-up steps.

There’s a list of tools here, each of which should get your computer up and running properly again. Microsoft has one such tool, as do the main anti-virus vendors such as McAfee and Norton. It’s a good idea to do a backup of files and personal data beforehand, just in case, but the process should – now that the workings of DNSChanger are broadly understood – be simple.


DNSChanger: How to find it and how to fix it is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.