Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

DNSChanger

From Wikipedia, the free encyclopedia
Computer malware

DNSChanger is aDNS hijackingTrojan.[1][2] The work of an Estonian company known asRove Digital, the malware infected computers by modifying a computer'sDNS entries to point toward its ownroguename servers, which then injected its own advertising into Web pages. At its peak, DNSChanger was estimated to have infected over four million computers, bringing in at leastUS$14 million in profits to its operator from fraudulent advertising revenue.[3]

BothWindows andMac OS X variants of DNSChanger were circulated, the latter taking the form of a related Trojan known asRSPlug. The FBI raided the malicious servers on November 8, 2011,[4] but they kept the servers up until July 9, 2012 to avoid affected users from losing Internet access.

Operation

[edit]

DNSChanger was distributed as adrive-by download claiming to be avideo codec needed to view content on a Web site, particularly appearing on roguepornography sites. Once installed, the malware then modified the system'sDomain Name System (DNS) configuration, pointing them to roguename servers operated through affiliates of Rove Digital.[3] These rogue name servers primarily substitutedadvertising on Web pages with advertising sold by Rove. Additionally, the rogue DNS serverredirected links to certain Web sites to those of advertisers, such as, for example, redirecting theIRS Web site to that of atax preparation company.[5] The effects of DNSChanger could also spread itself to other computers within aLAN by mimicking aDHCP server, pointing other computers toward the rogue DNS servers.[5] In its indictment against Rove, theUnited States Department of Justice also reported that the rogue servers had blocked access to update servers forantivirus software.[6]

Shutdown and interim DNS servers

[edit]

On October 1, 2011, as part ofOperation Ghost Click (a collaborative investigation into the operation), theUnited States Attorney for the Southern District of New York announced charges against six Estonian nationals and one Russian national connected to DNSChanger and Rove Digital forwire fraud,computer intrusion, andconspiracy.[6] Estonian authorities made arrests, and the FBI seized servers connected to the malware located in the United States.[3]

Due to concerns by FBI agents that users still infected by DNSChanger could lose Internet access if the rogue DNS servers were shut down entirely, a temporarycourt order was obtained to allow theInternet Systems Consortium to operate replacement servers, which would serve DNS requests from those who had not yet removed the infection, and to collect information on those still infected in order to promptly notify them about the presence of the malware.[7] While the court order was set to expire on March 8, 2012, an extension was granted until July 9, 2012, due to concerns that there were still many infected computers.[5]F-Secure estimated on July 4, 2012, that at least 300,000 computers were still infected with the DNSChanger malware, 70,000 of which were located in the United States.[8] The interim DNS servers were officially shut down by the FBI on July 9, 2012.[9]

Impact from the shutdown was considered to be minimal, due in part to majorInternet service providers providing temporary DNS services of their own and support to customers affected by DNSChanger. and informational campaigns surrounding the malware and the impending shutdown. These included online tools that could check for the presence of DNSChanger, whileGoogle andFacebook provided notifications to visitors of their respective services who were still affected by the malware.[8] By July 9, 2012, F-Secure estimated that the number of remaining DNSChanger infections in the U.S. had dropped from 70,000 to 42,000.[9]

References

[edit]
  1. ^Trojan:Win32/Dnschanger.O – Microsoft
  2. ^"Antivirus scan for fdde13872caa1a0e1b9331188ca93b8fc424fed43d86d5cf53f6965f6a77184e] at 2017-01-30 04:47:37 UTC – VirusTotal".www.virustotal.com.
  3. ^abc"How the most massive botnet scam ever made millions for Estonian hackers". Ars Technica. 10 November 2011. Retrieved6 July 2012.
  4. ^"Esthost Taken Down – Biggest Cybercriminal Takedown in History – TrendLabs Security Intelligence Blog". 9 November 2011.
  5. ^abc"Don't Lose the Internet in July! FBI Repeats DNSChanger Warning". PC World. Retrieved6 July 2012.
  6. ^ab"Seven charged in malware-driven click fraud case". Ars Technica. 9 November 2011. Retrieved6 July 2012.
  7. ^Zetter, Kim."'DNSChanger' Malware Could Strand Thousands When Domains Go Dark on Monday".Wired. Retrieved6 July 2012.
  8. ^ab"Are You Infected With DNSChanger Malware?". PC World. Retrieved6 July 2012.
  9. ^ab"ISPs Report Minimal DNSChanger Impact". PC World. Retrieved13 July 2012.

External links

[edit]
  • www.dcwg.org — DNS Changer Working Group; tools and information for diagnosing DNSChanger infections
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Retrieved from "https://en.wikipedia.org/w/index.php?title=DNSChanger&oldid=1284021392"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp