Kill DNS Changer Malware before the Doomsday Announced by FBI to Stay Online
DNS Changer Malware (DNSChanger) attempts to modify user’s browser experience by interfering into communication between PC and websites. Basically, any website name is to be translated into numerical code in order that it could be understood by the machine that tries to reach it. This job is to be done by DNS server. Where such translator is a fair one, it correctly converts names into numerical codes called Internet Protocol (IP) addresses so that one would get the website actually requested. FBI has arrested a hacker suspected to mastermind DNSChanger malware meant to replace good DNS server with bad one. The bad one incorrectly converts website name into IP address so that users get out-of-context websites loaded instead of that expected. In spite of that FBI has captured rogue servers, it lingered switching them off in order that victims of the hackers could remove DNSChanger Malware and restore proper settings for their browser. Failure to get rid of DNSChanger virus before the FBI Dooms Day of abolishing malicious servers will lead to the Internet connection errors or disability. FBI has announced it is to proceed in the closest feature to the final stage of their campaign against web-criminals, namely destruction of misleading servers. In spite of the informational campaign by official authorities and private malware experts, a rough estimate suggests hundreds of thousands of users are to get troubles with web-connection due to rogue DNS servers removal. Guidelines are available on FBI website (http://www.fbi.gov/news/stories/2011/november/malware_110911/DNS-changer...) to ensure a PC is not affected by the malware by comparing its DNS settings against the list off servers that used to be controlled by the black hats.