INTERNET BLACKOUT - JULY 9 2012- Government preconditioning?
2 posters
Page 1 of 1
INTERNET BLACKOUT - JULY 9 2012- Government preconditioning?
Apparently, if your computer is less then a year old, you won't be affected by this. But hundreds of thousands of other who's PC's are older than a year, will be affected.
Last edited by NYTE RYDA on Sun Jul 08, 2012 4:27 pm; edited 3 times in total
Re: INTERNET BLACKOUT - JULY 9 2012- Government preconditioning?
Internet blackout for thousands coming Monday, July 9
Posted on: 11:49 am, July 6, 2012, by Shellie Nelson, updated on: 02:16pm, July 6, 2012
NEW YORK (CNNMoney) — Hundreds of thousands of Internet users whose computers are infected with a particularly nasty virus will be unable to access the Web starting on Monday.
The Federal Bureau of Investigation will shut down Internet servers that it temporarily set up to support those affected by malicious software, called DNSChanger. Turning off those servers will knock all those still infected offline.
Over the past five years, a group of six Estonian cybercriminals infected about 4 million computers around the world with DNSChanger. The malware redirected infected users’ Web searches to spoofed sites with malicious advertisements.
In November 2011, the FBI and some overseas partners arrested those responsible, commandeered their servers, and attempted to warn those affected to get rid of the virus.
The FBI did not immediately take down the rogue servers, as infected computers would have lost Internet access, an FBI spokesman said.
To remedy the problem, the FBI had the nonprofit Internet Systems Consortium set up temporary servers. That way, computer owners would have time to get rid of their malware.
The servers were supposed to be shut down in March, but hundreds of thousands remained infected. Nearly 304,000 computers worldwide (about 70,000 in the United States) still had the virus in mid-June, according to the FBI’s latest report.
The FBI decided to give people even more time to check for the malware, extending the deadline until July. The agency now says the time has come to cut the cord, and the emergency servers will be shut down on Monday.
Though the FBI tried to send notifications to those infected, it could not identify all of them, a spokesman said.
To help the users still infected, the agency laid out a step-by-step plan on how to check to see if your computer has the virus.
How did this all happen?
The servers the cybercriminals set up redirected search traffic to their own rogue servers, bypassing Google, Microsoft’s Bing or other search engines’ servers. Users would be shown fake search results that sent them to spoofed websites with manipulated online ads.
For example, when a user searched for Netflix and clicked on the fake search result, he or she would instead be redirected to an unrelated website called “BudgetMatch.” If a user searched for ESPN and clicked through, DNSChanger would replace Dr. Pepper 10 ads on ESPN’s website with an ad for a timeshare business.
The fraudsters made $14 million through those illegal ads, the FBI said.
The malware also prevented users from updating their operating systems or anti-virus software, which may have detected the virus.
Facebook and Google joined the awareness efforts by alerting users whose devices appear to be infected. Both sites display warnings and provide links to help get rid of the malware.
Posted on: 11:49 am, July 6, 2012, by Shellie Nelson, updated on: 02:16pm, July 6, 2012
NEW YORK (CNNMoney) — Hundreds of thousands of Internet users whose computers are infected with a particularly nasty virus will be unable to access the Web starting on Monday.
The Federal Bureau of Investigation will shut down Internet servers that it temporarily set up to support those affected by malicious software, called DNSChanger. Turning off those servers will knock all those still infected offline.
Over the past five years, a group of six Estonian cybercriminals infected about 4 million computers around the world with DNSChanger. The malware redirected infected users’ Web searches to spoofed sites with malicious advertisements.
In November 2011, the FBI and some overseas partners arrested those responsible, commandeered their servers, and attempted to warn those affected to get rid of the virus.
The FBI did not immediately take down the rogue servers, as infected computers would have lost Internet access, an FBI spokesman said.
To remedy the problem, the FBI had the nonprofit Internet Systems Consortium set up temporary servers. That way, computer owners would have time to get rid of their malware.
The servers were supposed to be shut down in March, but hundreds of thousands remained infected. Nearly 304,000 computers worldwide (about 70,000 in the United States) still had the virus in mid-June, according to the FBI’s latest report.
The FBI decided to give people even more time to check for the malware, extending the deadline until July. The agency now says the time has come to cut the cord, and the emergency servers will be shut down on Monday.
Though the FBI tried to send notifications to those infected, it could not identify all of them, a spokesman said.
To help the users still infected, the agency laid out a step-by-step plan on how to check to see if your computer has the virus.
How did this all happen?
The servers the cybercriminals set up redirected search traffic to their own rogue servers, bypassing Google, Microsoft’s Bing or other search engines’ servers. Users would be shown fake search results that sent them to spoofed websites with manipulated online ads.
For example, when a user searched for Netflix and clicked on the fake search result, he or she would instead be redirected to an unrelated website called “BudgetMatch.” If a user searched for ESPN and clicked through, DNSChanger would replace Dr. Pepper 10 ads on ESPN’s website with an ad for a timeshare business.
The fraudsters made $14 million through those illegal ads, the FBI said.
The malware also prevented users from updating their operating systems or anti-virus software, which may have detected the virus.
Facebook and Google joined the awareness efforts by alerting users whose devices appear to be infected. Both sites display warnings and provide links to help get rid of the malware.
Similar topics
» Arrests reported as police close streets at downtown L.A. ArtWalk July 12, 2012 | 10:16 pm
» Montclair shooting
» 8 Government Conspiracy Theories (And How They Could Be Right)
» US government assassinated MLK
» The Gospel According to Government
» Montclair shooting
» 8 Government Conspiracy Theories (And How They Could Be Right)
» US government assassinated MLK
» The Gospel According to Government
Page 1 of 1
Permissions in this forum:
You cannot reply to topics in this forum
Sat Oct 12, 2024 12:51 am by socalifascolonias
» Inland Empire Gang List
Fri Aug 02, 2024 4:12 am by kamikazi1
» Perris Street Gangs
Thu Jul 25, 2024 12:45 pm by Blakkkk
» SOUTHSIDE COLTON LA PALOMA PARK LOKOS Ost GANG
Mon Apr 08, 2024 9:42 pm by Esemuggzy
» MCP13 WHO ARE THEY?
Sun Feb 25, 2024 8:09 pm by villejuggin
» Gangs that have died out
Mon Jan 15, 2024 11:59 am by Morrolooooks
» Fontana pt2
Sun Jan 14, 2024 11:59 am by Morrolooooks
» Inactive Fontana gangs
Sat Jan 13, 2024 5:43 pm by Morrolooooks
» IE gangs in the 90s
Sat Jan 13, 2024 3:58 am by 627.loka