Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

GeorgeGist

(25,321 posts)
Sat Apr 21, 2012, 08:32 AM Apr 2012

Hundreds of thousands may lose Internet in July

WASHINGTON (AP) — For computer users, a few mouse clicks could mean the difference between staying online and losing Internet connections after early July.

snip

The FBI is encouraging users to visit a website run by a security partner that will inform them whether they're infected — and explain how to fix the problem. After July 9, infected users won't be able to connect to the Internet.

To check and clean computers, try: www.dcwg.org

32 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Hundreds of thousands may lose Internet in July (Original Post) GeorgeGist Apr 2012 OP
This stinks of social engineering -- ie., this smells like a scam htuttle Apr 2012 #1
This is NOT a scam. This page on the FBI site links to the DCWG site: highplainsdem Apr 2012 #15
I did the check and mine's clean too. ananda Apr 2012 #17
highplainsdem, Thanks for the information. This is what I found: freshwest Apr 2012 #21
Agreed. Expect a surreptitious malware infection if you follow through with this silliness. geckosfeet Apr 2012 #16
I am suspicious too, but if the FBI wanted to get control of American computers rhett o rick Apr 2012 #30
Or drop memory sticks with "porn classics" printed on them... geckosfeet Apr 2012 #31
Oh, oh! Hey I was just curious. nm rhett o rick Apr 2012 #32
link to article?? Angry Dragon Apr 2012 #2
Here's the link from USA Today htuttle Apr 2012 #5
Original AP story here: pinboy3niner Apr 2012 #13
If it were real, it would be a .gov domain... YellowRubberDuckie Apr 2012 #3
Wrong dems_rightnow Apr 2012 #22
Oh goody. YellowRubberDuckie Apr 2012 #27
Agent Mike, here scan my computer and tell me if I'm ok... NightWatcher Apr 2012 #4
ah yes. trust the FBI to check your hard drive for you. nothing fishy here. piratefish08 Apr 2012 #6
Open your computer to a government security partner? Oilwellian Apr 2012 #7
Here's a link to the article... rucky Apr 2012 #8
No chance Sea-Dog Apr 2012 #9
If, like myself you are an untrusting sole....... wandy Apr 2012 #10
It appears that DNS changer changes the DNS Server IP address to 188.210.236.250 FarCenter Apr 2012 #20
How did you know Romania? ... wandy Apr 2012 #24
I looked it up in WhoIs at Network Solutions, then at RIPE in Amsterdam FarCenter Apr 2012 #25
Thanks. n/t wandy Apr 2012 #26
I navigated to the page below from the top level at www.fbi.gov htuttle Apr 2012 #11
Amen... KharmaTrain Apr 2012 #14
Yes. Going to a sight and leting them mess around with you're compute is....... wandy Apr 2012 #19
More on DNSChanger Trojan from Krebs... SidDithers Apr 2012 #12
The FBI site that just got hacked is telling you to go to another site and load s/w? tjwash Apr 2012 #18
Worried about FBI and your Internet privacy? vanlassie Apr 2012 #23
LOL!!!! Rex Apr 2012 #28
I used dns-ok.us Union Scribe Apr 2012 #29

htuttle

(23,738 posts)
1. This stinks of social engineering -- ie., this smells like a scam
Sat Apr 21, 2012, 08:55 AM
Apr 2012

I find one article about this on USA Today. Everything else is promo from this DCWG.

If this is real, the FBI went about dealing with it the wrong way. At this point, I wouldn't touch it with a 10 foot pole with a Windows NT CD tied to the end.

highplainsdem

(48,993 posts)
15. This is NOT a scam. This page on the FBI site links to the DCWG site:
Sat Apr 21, 2012, 09:28 AM
Apr 2012
http://forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS

That page on the FBI site also has the same list of DNSChanger Check-Up sites that the DCWG site has at

http://www.dcwg.org/detect/

I've checked both the dns-ok.us and the dns-ok.ca sites, and my computer is clean. You're not going to get malware from this check.

freshwest

(53,661 posts)
21. highplainsdem, Thanks for the information. This is what I found:
Sat Apr 21, 2012, 10:46 AM
Apr 2012

I went through mine, with the Comcast instructions, to check my DNS connections. My computer is clean, maybe because DNS was not enabled. I noted the grayed out numbers in the DNS window did not match the problem list, either.

Definitely not a scam since my ISP knows about it and has established a protocol for it. But they said they will not do an invasive test to determine anything about my computer, just to run through the instructions myself, instead.

Said they would notify by mail or email only if they received messages from the modem back to them if anything happened. I don't know if not having DNS enabled protected my computer from this or not. If they ever got that from my modem, they would give me instructions how to reset the modem and stop the problem.

So I did not do a malware test from the website. The FBI and other site directed me to my ISP without doing their test, and I think others can get this done without being exposed to the website's testing if they are worried.

I appreciate that Comcast said they were unwilling to do an invasive test; they only take in data sent back to them, from modem itself. If there was an infection, they would have noted the data streaming from my computer but only at the point of the modem.

I only have security updates from my computer working to prevent infections along with secure settings. My browser is also set to reject many things, giving me messages such as 'site is trying to check your keystrokes,' etc. kind of warnings which it gives the option to cut them off.

Thanks for the thread.

 

rhett o rick

(55,981 posts)
30. I am suspicious too, but if the FBI wanted to get control of American computers
Mon Apr 23, 2012, 09:33 AM
Apr 2012

they would just have to issue free copies of Angry Birds.

wandy

(3,539 posts)
10. If, like myself you are an untrusting sole.......
Sat Apr 21, 2012, 09:04 AM
Apr 2012

You can go directly to an FBI site here....

https://forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS

To get you're Dns server from Win XP do...

Start -> Run then enter cmd

In the Dos box enter

ipconfig /all

You may see two entries for DNS Servers
Enter the IP address that is not you're gateway on the FBI site.

 

FarCenter

(19,429 posts)
20. It appears that DNS changer changes the DNS Server IP address to 188.210.236.250
Sat Apr 21, 2012, 10:16 AM
Apr 2012

Trojan:BAT/Dnschanger.B changes the computer's DNS server to 188.210.236.250 for the following default Internet connection names:

LAN
LAN 1
LAN 2
Local Area Connection
Local Area Connection 1
Local Area Connection 2
WAN
WAN 1
WAN 2
Wireless Network Connection
Wireless Network Connection 1
Wireless Network Connection 2


http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Trojan:BAT/Dnschanger.B


If you are using an up to date security package, it should detect and remove this one.

PS -- the address is in Romania. Why would a country's border firewalls allow DNS traffic to other countries except between top level DNS servers?

wandy

(3,539 posts)
24. How did you know Romania? ...
Sat Apr 21, 2012, 11:18 AM
Apr 2012

I remember from long long ago that part of the Norten package could pinpoint IP adresses. Is their something that does that today other than Norten?

Just as an aside. After the fall of the Soviet Union a number of eastern block countries became very active in creating software.
A notable example would be iL2. Game, sure, but one of the best flight simulators ever.

It would seam only natural that a bunch of malware also come from these places.

Not impossable that Romania has a few top level DNS servers they don't officaly know about.

 

FarCenter

(19,429 posts)
25. I looked it up in WhoIs at Network Solutions, then at RIPE in Amsterdam
Sat Apr 21, 2012, 11:30 AM
Apr 2012
http://www.networksolutions.com/whois/index.jsp

This will tell you that the address range is allocated to RIPE in The Nethelands.

https://apps.db.ripe.net/search/query.html

This will tell you that the address is in a class C allocated to someone in Bucharest.

I think that Bulgaria and Ukraine are somewhat more notorious for malware writing.

htuttle

(23,738 posts)
11. I navigated to the page below from the top level at www.fbi.gov
Sat Apr 21, 2012, 09:05 AM
Apr 2012
https://forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS

Or go there yourself and search for 'DCWG'.

As I said up above, if this is real, the FBI is being really stupid about dealing with it. Going to a site to have your computer checked for malware is usually how malware gets ONTO your computer.

KharmaTrain

(31,706 posts)
14. Amen...
Sat Apr 21, 2012, 09:13 AM
Apr 2012

I saw this the other day and was very suspect of the site. I did my own internal search to see if the rouge file was in my machines and came up with nada...also double-checked to see if that name had been entered into my spyware (it had). I'm very dubious about downloading any file onto my machine unless I know it's from a known entity.

wandy

(3,539 posts)
19. Yes. Going to a sight and leting them mess around with you're compute is.......
Sat Apr 21, 2012, 09:54 AM
Apr 2012

a popular trick for malware providers.
Going to the FBI site and entering the DNS Server IP is like filling out a form.
Pretty much like entering a post here at DU.
About as safe as you can get.

SidDithers

(44,228 posts)
12. More on DNSChanger Trojan from Krebs...
Sat Apr 21, 2012, 09:06 AM
Apr 2012
http://krebsonsecurity.com/2012/02/half-of-fortune-500s-us-govt-still-infected-with-dnschanger-trojan/#more-13725

The malware, known as the “DNSChanger Trojan,” quietly alters the host computer’s Internet settings to hijack search results and to block victims from visiting security sites that might help scrub the infections. DNSChanger frequently was bundled with other types of malware, meaning that systems infected with the Trojan often also host other, more nefarious digital parasites.

In early November, authorities in Estonia arrested six men suspected of using the Trojan to control more than four million computers in over 100 countries — including an estimated 500,000 in the United States. Investigators timed the arrests with a coordinated attack on the malware’s infrastructure. The two-pronged attack was intended to prevent miscreants from continuing to control the network of hacked PCs, and to give Internet service providers an opportunity to alert customers with infected machines.

snip

Tom Grasso Jr., an FBI supervisory agent at the National Cyber Forensics & Training Alliance in Pittsburgh, Pa., said the DNSChanger Working Group — the industry and law enforcement coalition that’s handling the remediation — has been discussing what to do about the upcoming deadline, but he declined to offer specifics.

snip

Individuals in charge of a large network can learn if any systems are infected with DNSChanger by sending a request to one of the members of the DNS Changer Working Group (www.dcwg.org). Home users can avail themselves of step-by-step instructions at this link to learn of possible DNSChanger infections.


Sid

tjwash

(8,219 posts)
18. The FBI site that just got hacked is telling you to go to another site and load s/w?
Sat Apr 21, 2012, 09:37 AM
Apr 2012

Are you fucking serious?

Union Scribe

(7,099 posts)
29. I used dns-ok.us
Sat Apr 21, 2012, 12:42 PM
Apr 2012

It took all of 1 second and didn't do anything at all to my hard drive. It isn't a malware checker. If anyone is still paranoid, here's an article by the guy who made the site: http://www.circleid.com/posts/20120327_dns_changer/

Latest Discussions»General Discussion»Hundreds of thousands may...