The deadline for continued Internet connectivity for systems infected with the DNS Changer malware is fast approaching.
Any system infected with the malware may find it impossible to connect to the Internet after a court imposed deadline of July 9, 2012.
A Domain Name System (DNS) converts familiar alpha-based website addresses into the numerical Internet protocol (IP) the web uses to connect users with websites. DNS changer was developed by cyber criminals in an effort to redirect users to websites other than those desired.
Some of the redirects may be intended to benefit criminal elements financially, some may lead to bogus websites intended to defraud users, and still others may lead to further malware infections.
In 2011, the FBI's Operation Ghost Click successfully took over the rogue DNS Changer operation that had infected a large number of systems. The agency has since made an effort to inform many of the owners of the infected systems.
The original cutoff date for the remaining systems infected with the DNS Changer malware was March 8, 2012. Prior to the cutoff, a federal court order extended the deadline 120 days in an effort to allow those still infected with the malware to clean up their systems.
All Internet users are urged to check their systems for infection with the DNS Changer code, and to cleanse their systems if they are infected.
To see if your system is infected, simply visit the following website:
The site will inform you if your system is free of the DNS Changer, or will similarly inform visitors if their system is infected.
If a system is infected, users should visit the following to rid the device of the DNS Changer malware:
Failure to rid a device of the malware prior to the July 9 deadline could result in loss of Internet connectivity, further complicating any efforts to rid an infected system of DNS Changer.