The Truth Will Set You Free .....
Jun 6, 2012
DNS Changer Check-Up
DNS Resolution = GREEN
Your computer appears to be looking up IP addresses correctly!
Had your computer been infected with DNS changer malware you would have seen a red background. Please note, however, that if your ISP is redirecting DNS traffic for its customers you would have reached this site even though you are infected. For additional information regarding the DNS changer malware, please visit the FBI's website at:
http://www.fbi.gov/news/stories/2011/november/malware_110911
THIS AFFECTS BOTH MACS AND PCS!!!!!!
If you have the DNS Changer Trojan, then on July 9th 2012 your computer will not be able to access the internet. In this video I give more details, and show you how to check for it.
URL to check: http://www.dns-ok.us/
-If you get green background you don't have it :D
-Red means that you might :(
Fix: Download the Program by Avira
July 5, 2012
On July 9, thousands of Internet users worldwide could lose access after the FBI shuts down temporary DNS servers that replaced fraudulent servers operated by hackers.
Major companies and US government agencies are amongst those that could be blocked out, according to the Internet security firm IID.
The blackout will affect systems infected with the DNSChanger Trojan, a malware program that altered user searches and redirected them to pages offering fraudulent and, in some cases, dangerous products.
Last November the FBI arrested and charged six Estonian men behind the malware as part of Operation Ghost Click. These hackers were able to make a fortune off their project, raking in millions for ads placed on their fraudulent websites.
On the eve of the arrests, the FBI hired Paul Vixie, chairman of the Internet Systems Consortium (ISC) to install two temporary Internet servers that would prevent infected users from losing access to the Internet once the DNSChanger botnet was shut down. These users were advised to take steps to get rid of the malware on their computers, and the DNSChanger Working Group was set up by the computer industry and law enforcement to come up with a plan to phase out the surrogate servers.
The FBI was initially planning to shut down their provisional servers in March, but a US district court ruled the provisional servers were to remain operation until July 9.
Running the temporary servers for eight months has cost the FBI $87,000.
With the looming deadline approaching, estimates suggest up to 360,000 unique Internet addresses are still using the rogue servers, with most of them based in the US, according to federal authorities. Other countries with over 20,000 each include Italy, Canada, India, the United Kingdom and Germany. This is down from the over half a million addresses registered when the six hackers were arrested, but still enough to paralyze the functioning of important websites. At its peak several years ago, up to six million systems worldwide were infected with the malware.
The DNS system is a network of servers that translates a web address into a numerical IP address used by computers. Computers affected by the DNSChanger worm were reprogrammed to access rogue DNS servers that redirected them to fraudulent websites.
http://www.rt.com/news/fbi-internet-dnschanger-shutdown-440/print/
Update on March 12, 2012: To assist victims affected by the DNSChanger malicious software, the FBI obtained a court order authorizing the Internet Systems Consortium (ISC) to deploy and maintain temporary clean DNS servers. This solution is temporary, providing additional time for victims to clean affected computers and restore their normal DNS settings. The clean DNS servers will be turned off on July 9, 2012, and computers still impacted by DNSChanger may lose Internet connectivity at that time. |
Operation Ghost Click
International Cyber Ring That Infected Millions of Computers Dismantled
11/09/11
Six Estonian nationals have been arrested and charged with running a sophisticated Internet fraud ring that infected millions of computers worldwide with a virus and enabled the thieves to manipulate the multi-billion-dollar Internet advertising industry. Users of infected machines were unaware that their computers had been compromised—or that the malicious software rendered their machines vulnerable to a host of other viruses.
Details of the two-year FBI investigation called Operation Ghost Click were announced today in New York when a federal indictment was unsealed. Officials also described their efforts to make sure infected users’ Internet access would not be disrupted as a result of the operation.
The indictment, said Janice Fedarcyk, assistant director in charge of our New York office, “describes an intricate international conspiracy conceived and carried out by sophisticated criminals.” She added, “The harm inflicted by the defendants was not merely a matter of reaping illegitimate income.”
Beginning in 2007, the cyber ring used a class of malware called DNSChanger to infect approximately 4 million computers in more than 100 countries. There were about 500,000 infections in the U.S., including computers belonging to individuals, businesses, and government agencies such as NASA. The thieves were able to manipulate Internet advertising to generate at least $14 million in illicit fees. In some cases, the malware had the additional effect of preventing users’ anti-virus software and operating systems from updating, thereby exposing infected machines to even more malicious software.
“They were organized and operating as a traditional business but profiting illegally as the result of the malware,” said one of our cyber agents who worked the case. “There was a level of complexity here that we haven’t seen before.”
DNS—Domain Name System—is a critical Internet service that converts user-friendly domain names, such as www.fbi.gov, into numerical addresses that allow computers to talk to each other. Without DNS and the DNS servers operated by Internet service providers, computer users would not be able to browse websites or send e-mail.
DNSChanger was used to redirect unsuspecting users to rogue servers controlled by the cyber thieves, allowing them to manipulate users’ web activity. When users of infected computers clicked on the link for the official website of iTunes, for example, they were instead taken to a website for a business unaffiliated with Apple Inc. that purported to sell Apple software. Not only did the cyber thieves make money from these schemes, they deprived legitimate website operators and advertisers of substantial revenue.
The six cyber criminals were taken into custody yesterday in Estonia by local authorities, and the U.S. will seek to extradite them. In conjunction with the arrests, U.S. authorities seized computers and rogue DNS servers at various locations. As part of a federal court order, the rogue DNS servers have been replaced with legitimate servers in the hopes that users who were infected will not have their Internet access disrupted.
It is important to note that the replacement servers will not remove the DNSChanger malware—or other viruses it may have facilitated—from infected computers. Users who believe their computers may be infected should contact a computer professional. They can also find additional information in the links on this page, including how to register as a victim of the DNSChanger malware. And the FBI’s Office for Victim Assistance will provide case updates periodically at 877-236-8947.
http://www.fbi.gov/news/stories/2011/november/malware_110911
Comment
Will Ray,
EXACTLY! I wish everybody would get themselves prepared.
Most are just too programmed-stupid! A few years back when I lived in Florida a 'friend' of mine filled TWO (2) one-gallon jugs with water and called them his 'Hurricane supplies' ... as if two gallons of water would carry him, his wife, three children and the dog for about a month, the normal rescue and clean-up time. No food, no shelter, no blankets, no medical, no batteries, no fuel, no communications, et cetera, just two gallons of water ... how stupid can one get?
Things will be a hell of a lot worse than any natural disaster when the KAKS ON GOVERNMENT PAYROLL begin shutting down private homes and whole neighborhoods. And with a whole lot more violence ...
Glad to know there's at least ONE more with some common sense brains (YOU) out there.
So on the public relations side, it looks as if everything is normal and allowing for free exchange of ideas and assembly, but on the covert level, they take down their targets furtively. What's to stop them from doing this over and over to the point of driving people away in frustration. I'm taking a wait and see position and already have a set of instructions to follow on that day should it materialize and I believe strongly that one of these days it will happen. I'm being cautious because if I change any settings now, I may well shoot myself in the foot, which may serve them to their ends.
Yep. All the above is accurate ... except for the OMISSION OF THE DAMNED LIES created and perpetrated by the COMMUNISTS on government payroll - paid for with your taxes!
The SCAM is simple when stripped of all the government-sponsored falderal. (1) Create a 'virus' that will do what the propaganda says it will do - but with an 'easy' fix just in case it gets into our own systems; (2) Create a 'find-out-if-you've-been-infected' page for all those who MUST use it; (3) Create the 'all-clear' and 'you're infected' pages with additional 'information' for the doubters.
WHY? So those sucked into the SCAM will come to the 'cure' - rather than government having to search them out, saving time - WHERE ALL THE DATA ON THEIR SYSTEMS ARE COPIED for the benefit of FUTURE OWG scams, intrusions and atrocities! To be sure, a FEW but very publicized systems/victims will be directly targeted to add some degree of 'validity' to the SCAM.
Don't panic. Let the damned SCAM run its course and THEN take whatever action is necessary. I have copied everything on all my system to HARD DISCS .. with updates every few days. It takes a bit of time, but I can RESTORE virtually all my systems in ONE over-night session - and I'm not much of a nerd ...
GREAT CATCH, PAM!
We’re “mining” cryptocurrency with our phones! I’m looking for people who want to join me and my friends and figured this would be a good way to get the word out. 🚀 I am sending you 1π! Pi is a new digital currency developed by Stanford PhDs, with over 10 million members worldwide. To claim your Pi, follow this link https://minepi.com/PAMUTS and use my username PAMUTS as your invitation code.
Download this and you will get cryptocurrency mining on your phone, and remember every 24 hours to open the app and touch the Pi button that way it automatically starts mining for you, you basically have to do nothing after that just let it Stay in the background mining cryptocurrency for you until one day it’s worth money for enough to cash it out!
"It was the poverty caused by the bad influence of the
English Bankers on the Parliament which has caused in the colonies hatred of the English and...the Revolutionary War."
– Benjamin Franklin
"Guard with jealous attention the public liberty. Suspect every one who approaches that jewel. Unfortunately, nothing will preserve it but downright force. Whenever you give up that force, you are ruined."
Patrick Henry
June 26, 1788
© 2025 Created by Pam Vredenburg.
Powered by
You need to be a member of United Truth Seekers to add comments!
Join United Truth Seekers