To illustrate just how pervasive and problematic DNSChanger has been since being discovered in late 2005, IID has designed the first infographic (click above for large version) detailing this malware infection.
In addition to a timeline of how DNSChanger has progressed and an illustration of the collective intelligence that has helped combat the malware, the infographic shows exactly how employees at Fortune 500 companies became infected and how the malware’s spread could have easily been stopped.
“DNSChanger is an insidious form of malware affecting everyone from the everyday consumer to a large chunk of the Fortune 500,” said IID CEO Lars Harvey. “By working together to pool collective intelligence on the latest security threats, enterprises can ensure DNS resolvers do not enable employees to visit Internet locations hosting malware like DNSChanger—protecting their customer confidence, revenue, intellectual property and much more.”
Because infected computers and routers will have no servers directing their DNS requests after July 9, the Internet may literally go dark for people using those computers or routers.
Another effect of DNSChanger: if an enterprise’s employee has the malware on their computer even before the temporary servers go down, that enterprise is susceptible to having their proprietary information stolen. That’s because DNSChanger disables Anti-Virus (A/V) and regular software updates, exposing victims to attacks from other virus families.
This enables criminals to view any data, messages exchanged and more on a victim’s computer, depending on what the victims’ machines are infected with.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.