Despite months of warnings, 303,867 machines worldwide remain infected with DNSChanger malware, according to the most recent statistics from the DNSChanger Working Group. Unless something happens within the next two weeks, these machines will lose internet connectivity on July 9, when the alternate DNS servers maintained by the nonprofit Internet Systems Consortium are turned off. The trojan can modify DNS settings to point compromised computers to rogue DNS servers, giving attackers control over which websites visitors could access. The alternate servers provide valid DNS routing for those machines still configured to use the malicious addresses, but that functionality is slated to attend in just under two weeks.
Please login or register first to view this content.