[152353] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Operation Ghost Click

daemon@ATHENA.MIT.EDU (Andrew Latham)
Thu Apr 26 17:45:06 2012

In-Reply-To: <4F99C03A.30506@mompl.net>
Date: Thu, 26 Apr 2012 17:44:33 -0400
From: Andrew Latham <lathama@gmail.com>
To: Jeroen van Aart <jeroen@mompl.net>
Cc: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Thu, Apr 26, 2012 at 5:38 PM, Jeroen van Aart <jeroen@mompl.net> wrote:
> Excuse the horrible subject :-)
>
> Anyone have anything insightful to say about it? Is it just lots of fuss
> about nothing or is it an actual substantial problem?
>
> http://www.fbi.gov/news/stories/2011/november/malware_110911
>
> "Update on March 12, 2012: To assist victims affected by the DNSChanger
> malicious software, the FBI obtained a court order authorizing the Internet
> Systems Consortium (ISC) to deploy and maintain temporary clean DNS servers.
> This solution is temporary, providing additional time for victims to clean
> affected computers and restore their normal DNS settings. The clean DNS
> servers will be turned off on July 9, 2012, and computers still impacted by
> DNSChanger may lose Internet connectivity at that time."
>
> --
> Earthquake Magnitude: 5.5
> Date: Thursday, April 26, 2012 19:21:45 UTC
> Location: off the west coast of northern Sumatra
> Latitude: 2.6946; Longitude: 94.5307
> Depth: 26.00 km
>

Yes its a major problem for the users unknowingly infected.  To them
it will look like their Internet connection is down.  Expect ISPs to
field lots of support calls.


-- 
~ Andrew "lathama" Latham lathama@gmail.com http://lathama.net ~


home help back first fref pref prev next nref lref last post