Regarding the July 9th DNS Changer Malware Issue

Or as my relative called it “the ghost hacker”. I heard a little about this issue from a relative. I can’t seem to grasp onto how “severe” this issue really is, despite how “dramatically” my relative explained it.

I already checked this website: http://www.dns-ok.us/ , and it says my family’s computer is okay. So I shouldn’t worry about changing my DNS settings yes? (Hopefully not, I don’t know how to do that heh)

However, how is this malware infecting computers in the first place? It doesn’t sound like the typical malware that one may get from opening an email or clicking on a bad advertisement.

Is it possible for currently uninfected computers to get infected? If my family’s computer is safe, should I worry about this issue at all? Or since the people who created this malware got caught (I heard?) is it impossible for uninfected computers to get infected (“Impossible” as in, impossible to get if you don’t go on the internet)? Er, in other words: is the malware out there on the internet “ready to infect new computers” or did the malware “go down with” the creators?

Lastly, is the internet “shutting off” on July 9th due to the malware (in other words, the malware caused the internet to go down) or is the government/officials/whoever is “in charge” shutting it off as a “safety measure”? Sounds like the latter. Though, according to my relative the malware was “set to go off” on July 9th. It’s all pretty confusing and “iffy” to me.

Sorry, I’m pretty misinformed and I can’t completely comprehend some of the articles I read about this issue. Is it really that big of a deal?

I’m an amateur when it comes to malware so I have some troubles understanding this kind of stuff. My apologies.

Thanks in advance!
Sorry for the troubles.
-Misuzu

  1. Yes.
  2. It can’t anymore, as it was taken down a while ago.
  3. Not with this one. :wink:

^ Thank you for the fast reply!

And that’s what I suspected, but I wasn’t sure. Thank you. :slight_smile:

Hi Misuzu,

Please. do not worry. Just go here and chek with this free scanner whether your OS and third party software is fully up to date and patched: http://secunia.com/products/consumer/osi/online/
If that is the case and you have updated all and removed all the older versions, you do not have to loose one wink of sleep over this malware. Then you are not vulnerable and get not get infested. Stay safe and secure online is the wish of,

polonus

You’re welcome. :slight_smile:

avast! blog alerted to this: https://blog.avast.com/2012/07/06/how-not-to-lose-your-internet-access-on-jul-9th-2012/

I did as bob3160 suggested and started using openDNS! Now I am no longer concerned about losing the web.
http://www.opendns.com/ :slight_smile:

+1
I also use OpenDNS as well they have released OpenDNSCrypt for XP;)

I’m still using my ISP’s DNS servers and I’m not concerned at all. All tests I’ve tried show those servers to be the fastest for me.

I checked on the site about the malware and I’m fine.

OpenDNS would not prevent a loss of the internet if you were infected either.

The keyword is “infected”. If a user is not infected then OpenDNS offers another layer of protection against malware.
After visiting their website I figured out they have more going for them than my ISP. 8)

BTW…I also did some research before starting using OpenDNS. :slight_smile:

You’re exactly right and that’s what I meant. I tried it myself and found it too much slower than my ISP so I dumped it.

Look here for the latest: http://www.dcwg.org/
Even a lot of infected users are kept online through their service provider.
Window users might go back to default initial settings after these rogue DNS servers come disabled.
And those that are still affected we do not hear about, because they are offline,

polonus

Even the press is now calling this essentially a repeat of the Y2K panic. According to more or less official sources (sorry, can’t remember who or where), here in Canada all of a few hundred computers, out of heaven knows how many total, were “stranded” when the temp servers shut down.