DNSChanger : prolongation de 4 mois (à J-2)

Cliquer ici pour agrandir
La justice américaine a accédé à la requête du FBI demandant une prolongation de l'autorisation de mener des actions pour mitiger les postes infectés par le cheval de Troie DNSChanger.
Un délai de 4 mois supplémentaires a été accordé par le juge hier, ce qui repousse de facto la date butoir de l'extinction des serveurs DNS "sains" de remplacement opérés par l'ISC pour le compte du FBI du 8 mars prochain au 9 juillet 2012. Il n'y aura donc pas de coupure d'accès à Internet pour les machines encore infectées après le 8 mars 2012.
Il faut néanmoins accélérer le processus de nettoyage des machines compromises, car il n'y aura vraisemblablement pas de prolongation supplémentaire au delà du 9 juillet. Nous vous invitons dès lors à vous rendre sur http://dns-ok.fr pour vérifier simplement et immédiatement que votre ordinateur n'est pas compromis par ce code malicieux.
Pour plus d'informations sur cette initiative, vous pouvez consulter notre précédent billet sur le sujet ici ou sur notre blog.


DNSChanger, FBI’s internet blackout postponed from 8 March to 9 July

Cliquer ici pour agrandir

Many people are asking me for updates on the case DNSChanger which held its breath many network users. During the last months the news circulating on internet on the planned blackout of Internet for million of users on 8 March decided by FBI to deal with cyber threats. The action must be done to stop the diffusion of DNSChanger Trojan, a malware that has infected million of computers all over the world in more than 100 countries. The story begins last year when in Estonia was arrested a group of person accused of having developed the dreaded trojan that seems to be able to spread with surprising ease.
Under a court order, expiring March 8, the Internet Systems Corporation is operating replacement DNS servers for the Rove Digital network. This will allow affected networks time to identify infected hosts, and avoid sudden disruption of services to victim machines.

What does the DNS Changer Malware do?
The botnet operated by Rove Digital altered user DNS settings, pointing victims to malicious DNS in data centers in Estonia, New York, and Chicago. The malicious DNS servers would give fake, malicious answers, altering user searches, and promoting fake and dangerous products. Because every web search starts with DNS, the malware showed users an altered version of the Internet. Once discovered the cyber crime the FBI to give businesses and private individuals affected by DNSChanger time to cleanse infected systems has replaced the Trojan’s DNS infrastructure with surrogate, legitimate DNS servers. Replacing the command server the feds have prevented the worm propagation. The FBI took over the botnet’s command-and-control (C&C) servers in November as part of Operation Ghost Click.

To counter the threat the Federal Bureau of Investigation has initially planned to shutdown several DNS (domain name servers) on March 8, with the undesirable side effect of blocking millions from using the Internet. DNSChanger is able to change inside the infected system the DNS settings hijacking web traffic to unwanted and infected sites. Despite the calls provided by the press and the major law enforcement, the situation is far from reassuring, because too many PCs are being infected and potentially damaged by the planned blackout. More than 3 million PCs worldwide were still infected with DNSChanger that is the main reason that have prompted authorities to extend the period before the planned shutdown of the surrogate servers.
Last week a federal judge has postponed, with an order, the blackout of the surrogate servers of 120 days to give companies, businesses and governments more time to arrange the response to the threat.

Cliquer ici pour agrandir
To meet the threat was also set up a special task force to provide support for private companies and were given the necessary instructions to the removal of malware on the site DCWG.org
A copy of the court order extending the deadline until July 9, 2012 is available on the following link.