Malware Attacks Still Pose Serious Threat Even Though DNSChanger Fails to Ignite Major Internet Disruption

July 11, 2012
By: Ed Silverstein

Just because there were no major Internet outages this week from the DNSChanger virus, other viruses could attack computers in the future.

“Malware gets better, not worse,” warned a recent blog post from Threatpost, a security news service from the Kaspersky Lab (News - Alert). “Rogue DNS schemes like this are not new, attackers continually adapt and improve their tactics as they see how users and law enforcement agencies respond.”

USA Today reported that the most recent and highly publicized DNSChanger malware simply “fizzled.” One report estimated that only 47,000 Americans became disconnected from the Internet this week. This compares to several months ago, when viruses linked to DNSChanger infected four million computers globally. But ongoing attempts were largely successful to clean out many of the infected computers over recent months. In fact, over 90 percent of the computers infected by the virus were cleaned up before Monday, CNN Money said.

Also, in a stern warning, Johannes Ullrich, chief research officer at the SANS Security Institute, told USA Today that, “about 100 times more users are infected by more dangerous, current malware without knowing that they are infected.”

On Monday, the FBI took away a safety net put up in November to protect some 577,000 Windows PCs from DNSChanger. Some 277,000 PCs, including 64,000 in the U.S., are still infected, according to news reports. Most ISPs collaborated with the FBI to avoid breaks in Internet service. Also, many anti-virus products offered solutions to the virus. In addition, an FBI-approved website gave users links to PC checks, as well as instructions on removing the virus. "The DNS settings check isn't that difficult," Dennis Fisher, editor-in-chief of Threatpost.com, said. "Anyone who can navigate through the control panel should be able to do it. It's just a matter of clicking through a few dialogue boxes."

The malware was serious, though. It basically rerouted searches and sent traffic to “rogue” DNS servers and then to websites with ads “controlled” by criminals who operated a scam and earned money for clicks on ads, according to Threatpost. In November, agents arrested six Estonians who operated the fraud ring that generated an estimated $14 million from the multi-year scam.

This week’s malware issue comes just as U.S. Gen. Keith B. Alexander, who heads up the National Security Agency (News - Alert) (NSA), warned members of Congress to soon enact a national cyber-security law. He said the law can avoid civil liberty violations – a growing concern.

"This cyber-security legislation coming up is going to be very important to the future of this country," Alexander said during a rare public address which was held at the American Enterprise Institute and released to the public via video. "If the critical infrastructure community is being attacked by something, we need them to tell us – at network speed. … It doesn't require the government to read their mail, or your mail, to do that.”

IP theft is costing U.S. companies $250 billion a year, according to Symantec (News - Alert) data. Also, cybercrime is estimated to cost worldwide $114 billion – or $388 billion if downtime is added. In addition, $1 trillion was spent worldwide on remediation. Also, in response to a news reporter’s question, Alexander denied rumors that the NSA’s new data center in Utah would collect e-mails and Web histories from Americans. “We don’t store data on U.S. citizens … That’s baloney. … That’s ludicrous,” he said.




Edited by Brooke Neuman


Original Page