Hundreds of thousands of Internet users may lose their online access on July 9, 2012, and Better Business Bureau is urging all consumers and businesses to run a quick and easy diagnostic test to see if their computers are infected. The FBI’s DNS Changer Working Group can detect the malware and explain how to fix infected machines.
“Everyone should check to see if their computer is infected,” urges Julie Wheeler, BBB President. “It takes less than a minute to check and, if your equipment is clean, there is nothing more you need to do. If your computer is infected, the DNS Changer Working Group recommends the necessary steps to save your computer. But this must be done by July 9th or you could lose internet access.”
The FBI is encouraging users to visit a website run by its security partner, http://www.dcwg.org, that will let users know if their computer is infected and explain how to fix the problem.
Last November, the FBI took down the servers of international hackers operating out of Estonia. The hackers had already successfully downloaded malware onto more than half a million computers, turning off virus updates and redirecting consumers to fraudulent websites. If the servers had simply been shut down, the victims’ computers would no longer be able to access the internet. Instead, the FBI set up clean servers to replace the ones that were running the scam, and victims have been redirected to those clean servers ever since, usually without any knowledge they’d been infected in the first place.
Originally the rescue servers were to be active until March, but a court ruling extended the program until July 9th. At that time the clean servers will be turned off and anyone who is still infected with the malware will lose their internet access. The FBI believes there are still about 360,000 infected computers in a dozen countries, including the U.S. and Canada.
If you need more information, contact the BBB at (540) 342-3455 or (800) 533-5501. You can also visit www.bbb.org. Follow us on Twitter at twitter.com/BBB_WesternVA.