Google warns users about DNSChanger malware

Published Date
29 - May - 2012
| Last Updated
29 - May - 2012
Google warns users about DNSChanger malware

Google has warned users that they may lose access to the Internet on July 9 because of a DNSChanger Trojan.

According to reports, U.S.' FBI has detected the virus and set up a safety net to ensure infected computers are safe. The problem began when the international hackers ran online advertising scam to gain control of the affected devices across the globe, it's learnt.

Google, meanwhile, has launched an awareness campaign for its users to keep its users away from the virus. Google will be displaying pop up alerts that will come on top of the search results page.

Google is notifying its users about the threat of DNSChanger, with a message: “your computer appears to be infected” for devices infected by the virus. Google had launched a similar awareness campaign last year for a different sort of malware.

According to Google, so far up to 500,000 internet users might have been hit by the malware.

“The Domain Name System (DNS) translates familiar web address names like into a numerical address that computers use to send traffic to the right place. The DNSChanger malware modifies DNS settings to use malicious servers that point users to fake sites and other harmful locations,” said Google' security engineer, Damian Menscher in blog post.

“DNSChanger attempts to modify the settings on home routers as well, meaning other computers and mobile devices may also be affected”.

Google warns in case your computer shows DNSChanger corruption, you will receive, along with the notification, recommendations from Google as to how to purge the malware from your devices. Though Google does not guarantee full recovery, but it adds, "If more devices are cleaned and steps are taken to better secure the machines against further abuse, the notification effort will be well worth it."

To learn more about the hack attack and how you can detect whether your computer's infected, click here.

Also read,