BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Can’t load this page? Check your DNS settings.

Post by Nate Hatcher July 6, 2012

DNSChanger malware is on top of everyone’s mind this week since over 270,000 systems may be effectively losing internet access next Monday because of it.

What is DNSChanger malware?
The criminal organization behind DNSChanger is long gone, but the effects of the malware persist. DNSChanger malware, as the name says, changes your DNS server settings so that infected systems check the servers set up by the criminal organization, allowing them to control your internet traffic.

Even once the malware has been removed the bad DNS settings can remain, and if your router still has its default username and password (your local security expert is now feeling justified about harping on defense in depth) your router might be broadcasting the bad DNS settings to systems on your network as well.

Those rogue DNS servers have been cleaned and maintained since November 2011 in order to allow affected users to correct their DNS settings. However, they are being taking offline on July 9th. Once the DNS servers are taken offline all affected systems will no longer be able to find servers by name, making most of the net inaccessible to the affected users.

Not sure if you’re affected by this?
One of our researchers explains how to check whether your DNS server is part of the rogue DNSChanger group and lists other resources in a recent post.

Please make sure to check your DNS server as soon as possible. Check now.

Please note: BeyondTrust customers using PowerBroker Desktops Windows Edition should rest assured that malware such as DNSChanger is severely mitigated in IT environments that practice least privilege management. If you are not already familiar with our line of privilege management products you should head on over here to learn more.

Tags:
,

Leave a Reply

Additional articles

BI-Qualys-Connector-IMG1

Getting More Value from QualysGuard Vulnerability Data with BeyondInsight v5.1

If your vulnerability assessment scans can’t produce meaningful and actionable reports, performing a scan does no good for anyone. If you’ve read my other blog posts, you know I have no qualms about stating that BeyondTrust provides the best vulnerability reporting in the industry. Ask your favorite analyst and they’ll tend to agree. Of course,…

Post by Morey Haber April 18, 2014
Tags:
, , , , , , , ,
insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,