ISPs downplay DNSChanger impact as substitute servers go dark
Clean-up efforts in the last three weeks reduced U.S. infection count by 34%
Computerworld - Government-sponsored servers designed to keep DNSChanger-infected PCs and Macs online were switched off earlier today as scheduled, but several major U.S. Internet service providers downplayed problems to their customers.
The number of IP addresses with infected machines had fallen since mid-June by 34% in the U.S., according to July 4 data from a group of security experts formed to combat the malware. Worldwide, the infection count decreased by 19% in the same period, said the DNSChanger Working Group (DCWG).
DNSChanger, which had hijacked users' clicks by modifying their computers' domain name system (DNS) settings, shunted DNS requests to the criminals' own servers. The hacker-controlled DNS servers then redirected victims to malicious sites that resembled real domains.
At one point, as many as four million PCs and Macs were infected with the malware, which earned its makers $14 million, U.S. federal authorities have said.
As part of last November's "Operation Ghost Click," the FBI arrested six Estonian men -- a seventh, who is Russian, remains at large -- seized more than 100 servers operated by the gang, and then substituted replacement DNS servers for those taken offline. Without the substitutes, DNSChanger-infected systems would have been immediately knocked off the Internet.
Instead, the substitute servers, which were maintained under a federal court order by Internet Systems Consortium (ISC), the non-profit group that maintains the popular BIND DNS open-source software, kept victims online until 12:01 a.m. ET today, when their plugs were finally pulled.
Originally, the stand-in servers were to be turned off March 8, but a federal judge extended the deadline to July 9.
Although some headlines last week touted the impending shutoff as a doomsday event, the number of people affected was actually quite small considering the number of Internet-capable desktops and notebooks.
In the U.S., for example, the 45,619 IP addresses DCWG reported as infected as of July 4 represented just 0.02% of all Internet-able desktops and laptops, or just 2 out of every 10,000 PCs and Macs.
Several large U.S. ISPs also noted the small number of victims. "The number of customers affected [by DNSChanger] is very, very small," said Mark Siegel, an AT&T spokesman, today.
"A very, very small number of our customers have been affected," echoed Alberto Canal, a spokesman for Verizon's FIOS Internet service. "Our call centers are not seeing any activity."
Some ISPs, including both AT&T and Verizon, are keeping customers online by directing their DNS requests to special servers that kicked in when the FBI's replacement systems went dark earlier today.
Siegel said AT&T would operate the substitute-substitute DNS servers until the end of 2012, while Canal said Verizon would run those for its customers through this month only.
- 2013 Cyber Risk Report The "Cyber risk report 2013 Executive summary" presents the major findings of HP Security Research's comprehensive dive into today's cyber vulnerability and threat...
- Why You Need a Next-Generation Firewall This white paper explores the reasons for implementing next-generation (NG) firewalls and lays out a path to success for overburdened IT organizations.
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Malware and Vulnerabilities White Papers | Webcasts