Fortune 500 firms still infected with DNSChanger

Powered by SC Magazine
 

DNS server deadline looms.

More than one in 10 Fortune 500 companies still have computers infected with DNSChanger malware, according to estimates by Internet security firm IID.

The firm also estimated that around four percent of "major US Government" agencies also still have infected machines, a figure which has been steady for almost three months.

DNSChanger redirected legitimate searches by computer users to malicious sites via rogue DNS servers.

US authorities have interim control of the rogue DNS servers but expect to shut them down on July 9, after which infected computers won't be able to connect to the Internet.

The number of infections has been slowly reducing over the past few months. However, it is expected up to 300,000 Internet users worldwide could face connection problems when the DNS servers are switched off next week.

It remains unclear whether the FBI will be granted a further extension by a US Court to operate the DNS servers while infections continue to be identified and removed.

Six Estonian nationals have been arrested and are currently subject to extradition procedures to face charges in the United States over DNSChanger.

Copyright © iTnews.com.au . All rights reserved.


Fortune 500 firms still infected with DNSChanger
 
 
 
Top Stories
ATO releases long-awaited Bitcoin guidance
Everyday investors escape the tax man.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger'
IT transformation starts to reap results.
 
Sydney Trains chief thinks beyond Opal
Plots app to help you find a seat on the train.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 428

Vote