Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A US judge has granted a four-month extension for the operation of temporary DNS servers installed to combat a trojan affecting three million PCs globally.
The extension request, published by security blogger Brian Krebs, would delay the replacement of the rogue servers used in the malware distribution for another 120 days, giving businesses and governments additional time to react to the infections.
According to the IDD report, “if an enterprise's employee has DNSChanger on their computer, it means that enterprise is susceptible to having their proprietary information stolen".
IDD updated its infection figures last week, indicating a major downturn in the number of affected enterprises. The extension given on Monday could lead to an even more dramatic decrease in the contagion.
As well as disabling anti-virus and software updates for users, the DNSChanger malware redirects infected computers to malignant sites via the rogue DNS servers, located at data centers in Manhattan and Chicago.
While businesses and government agencies were a target of the trojan, home users were also affected.
Arrests in relation to the attack -- which hauled in an estimated $14 million, according to the FBI -- were made in November after a two-year investigation.
The FBI is currently seeking the extradition of six Estonian nationals linked to the attacks, who, according to them, used the malware to “manipulate the multi-billion-dollar internet advertising industry".
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.