Header Ads

PLDT and Smart urge Internet users to check for “DNSChanger” malware on or before July 9, 2012

Are you an Internet user? If so, leading Philippine telco PLDT and its wireless subsidiary Smart are urging you to check if your computer is infected by the “DNSChanger” malware on or before July 9, 2012. More details after the jump.

“If you fail to take action, you may not be able to access Internet websites and use web services like email and search,” said PLDT Smart Spokesperson Ramon Isberto.

What is DNSChanger?

DNSChanger is a globally-distributed malicious software (malware) created in 2007 by a group of Internet hackers. It modifies the Domain Name Server (DNS) settings of an infected computer and diverts users of these computers to servers owned by the hackers instead of accessing the servers of the real websites.

The hackers are thus able to display advertisements of fake or malicious products and direct victims to websites which are also infected with other malware.

Server Shut Down

In 2011, law enforcement agencies from around the world arrested the group behind DNSChanger. To counteract its initial effects, malicious DNS servers were shut down and alternate DNS servers were set up to temporarily replace the malicious servers and give people time to clean up the infection.

However on July 9, 2012, these temporary servers will be shut down rendering computers still infected with DNSChanger unable to access Internet services.

In line with the worldwide effort against the DNSChanger, both PLDT and Smart are asking their subs to check their computers to determine if their devices are infected with the malware. They can do this by following these steps provided by the DNS Changer Working Group (DCWG):

Manual Checking/Detection


  1. Click Start
  2. Open the Command Window
    • (For Windows 7) Type cmd at the search bar
    • (For Windows XP) Click Run, then type cmd at the bar
  3. Type ipconfig /all
  4. Search for the DNS Servers section

Mac OS X

  1. Click the Apple icon an the top left of the screen
  2. Select System Preferences
  3. Locate the “Network” icon
  4. Read the “DNS Server” line

Ensure that the DNS Servers are not within the following range of Internet Protocols (IPs):

  • through
  • through
  • through
  • through
  • through
  • through

If the DNSChanger is detected, users may then use any of the following software to clean the infection:

Alternatively, subscribers may also visit the following sites to their system checked automatically

For more information on DNSChanger, visit the official DCWG website at www.dcwg.org.

No comments:

Powered by Blogger.