SlideShare a Scribd company logo
1 of 12
DNS Changer Malware
Surun Infocore Systems
DNS?
(What is that?)
Before Understanding DNS Malware –
Lets revise some important basics…
DNS
Domain Name System :
• As per Wiki –
– The Domain Name System (DNS) is a hierarchical distributed naming system for
computers, services, or any resource connected to the Internet or a private network.
– A Domain Name Service translates queries for domain names (which are meaningful to
humans) into IP addresses for the purpose of locating computer services and devices
worldwide. (This is where the real problem starts)
– The Domain Name System makes it possible to assign domain names to groups of
Internet resources and users in a meaningful way, independent of each entity's physical
location. Because of this, World Wide Web (WWW) hyperlinks and Internet contact
information can remain consistent and constant even if the current Internet routing
arrangements change. (This is the secrete essence of this problem)
DNS Server
DNS Server:
• DNS Server its important entity in translating IP Address into hostnames
(website names) or vice versa (hostnames to IP Address)
• Translating domain names/hostnames (websites) to IP addresses is known as Forward
DNS.
• Translating IP addresses to domain names/hostnames (websites) is known as Reverse
DNS.
• Let us understand how DNS Servers exactly work by illustrating it with an example
DNS Server
I need direction to connect to
www.Google.com
The domain name www.Google.com is not my
database, I will check with other DNS Server
DNS Server
Hey as per my database www.Google.com is mapped at following
IP Address 74.125.236.201
1
2 3
4
www.Google.com server
(IP = 74.125.236.201)
5
Hey, thank you for direction,
now I can connect to google.com
Working of DNS Server
IP Address Configurations
IP Configuration:
• Two methods are widely used to configure your computer`s IP Address
– Dynamic
• For user Dynamic IP Address Configuration is comparatively very easy because honestly user don’t have to do
anything here apart from clicking to “Obtain an IP Address Automatically” and then the system will
automatically sets IP address .
• Also like same, we can “Obtain DNS Server Address Automatically”
• Some Internet Service Providers (like Reliance Internet Connections, Tikona net connections) prefer this kind of
setting in your computer.
– Static
• In this case the IP address is assigned to the system, so that machine will have unique identification.
• We can set DNS Server also in same manual assignment method.
• Please note – here IP address you can set depending upon your network settings in office or home, but you need
to strictly input the DNS server details as provided by your Internet Service Provider only, if you change it to
anything else, then there is wide scope that Internet will not function
IP Address Configurations
Static IP Configuration for DNS provided by ISP BSNL (Pune):
To check further settings click to Advance (Here the real problem definition starts)
IP Address Configurations
Static IP Configuration for DNS provided by ISP BSNL (Pune):
DNS Changer Malware
DNS Changer Malware:
• The meaning of Malware – Malfunction Software –
– Any software which can introduce malfunction in system is known as Malware.
– This DNS Changer malware, put additional DNS Server address into IP Address
configurations, along with your regular DNS server Address.
– So , it will be very clear that, when ever user tries to connect to any website the DNS
Server reads his / her request (to connect to website) and re-direct the user to any other
websites, which may be harmful to your computer, like Adware websites.
– The meaning of Adware – Advertisement Software
• Any software which is responsible for showcasing various online advertisements on your computer are known
as Adware.
• Example of such advertisements will be.. “Your computer is infected with Viruses.. Please Scan your Computer
with our latest Online Antivirus FREE” and once user respond to this advertisement, the fake antivirus will get
installed in users system and it will open gateway for more other viruses and Trojans
Problematic DNS Server
I need direction to connect to
www.Good-Website.com
I am a Problematic DNS Server,
I will redirect this use to other website
1
2
3
(Problematic websites, which may steal personal details like
passwords and may download other viruses in system)
DNS Changer Malware
Identifications:
• Detection of this DNS Changer malware is made easy by some online
websites. You just have to visit http://dns-ok.us/
• The little bit tricky method (which I found when I was with this virus)
– Try to open website of any famous antivirus company
– This virus will not allow you open it.
– But rest all other websites will work superfine
– (Smart.. Yeah.. !!)
• For Advanced Users the more tricky method is explained on next slide
DNS Changer Malware
Identifications (For Advanced Users):
• Go to command prompt
• Execute – ipconfig /all
• Check for DNS Server
• It has been observed if DNS server IP Address is indicating, IP Address any
of following range then system is infected with this malware
From To
77.67.83.1 77.67.83.254
85.255.112.1 85.255.127.254
67.210.0.1 67.210.15.254
93.188.160.1 93.188.167.254
213.109.64.1 213.109.79.254
64.28.176.1 64.28.191.254

More Related Content

Similar to Dns Changer Malware

What is a domain name system(dns)?
What is a domain name system(dns)?What is a domain name system(dns)?
What is a domain name system(dns)?Abhishek Mitra
 
Introduction to Networking Commands & Software
Introduction to  Networking Commands & SoftwareIntroduction to  Networking Commands & Software
Introduction to Networking Commands & SoftwareMuhammadRizaHilmi
 
How to stop a VPN DNS leak.
How to stop a VPN DNS leak.How to stop a VPN DNS leak.
How to stop a VPN DNS leak.LimeVPN
 
Nameserver: What Is It And What Does It Do?
Nameserver: What Is It And What Does It Do?Nameserver: What Is It And What Does It Do?
Nameserver: What Is It And What Does It Do?Host It Smart
 
How DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An IntroductionHow DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An Introductionyasithbagya1
 
How to configure dns server(2)
How to configure dns server(2)How to configure dns server(2)
How to configure dns server(2)Amandeep Kaur
 
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdfssuserfd0132
 
Setting up computer servers (sucs)
Setting up computer servers (sucs)Setting up computer servers (sucs)
Setting up computer servers (sucs)Melchor Maravillas
 
Name Services and Domain Name System
Name Services and Domain Name SystemName Services and Domain Name System
Name Services and Domain Name SystemAshish KC
 
Secure shell (ssh)
Secure shell (ssh)Secure shell (ssh)
Secure shell (ssh)Ishucs
 
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...Yankmo
 
How domain name servers work
How domain name servers workHow domain name servers work
How domain name servers workRaxTonProduction
 
Pmw2 k3ni 1-3a
Pmw2 k3ni 1-3aPmw2 k3ni 1-3a
Pmw2 k3ni 1-3ahariclant1
 

Similar to Dns Changer Malware (20)

What is a domain name system(dns)?
What is a domain name system(dns)?What is a domain name system(dns)?
What is a domain name system(dns)?
 
Introduction to Networking Commands & Software
Introduction to  Networking Commands & SoftwareIntroduction to  Networking Commands & Software
Introduction to Networking Commands & Software
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
M7 - Manual
M7 - ManualM7 - Manual
M7 - Manual
 
How to stop a VPN DNS leak.
How to stop a VPN DNS leak.How to stop a VPN DNS leak.
How to stop a VPN DNS leak.
 
Nameserver: What Is It And What Does It Do?
Nameserver: What Is It And What Does It Do?Nameserver: What Is It And What Does It Do?
Nameserver: What Is It And What Does It Do?
 
Dns server
Dns serverDns server
Dns server
 
Dns 2
Dns 2Dns 2
Dns 2
 
How DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An IntroductionHow DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An Introduction
 
How to configure dns server(2)
How to configure dns server(2)How to configure dns server(2)
How to configure dns server(2)
 
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
3.3_-_Lecture_3_Installing_the_DNS_Server_Role.pdf
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Network Testing ques
Network Testing quesNetwork Testing ques
Network Testing ques
 
Setting up computer servers (sucs)
Setting up computer servers (sucs)Setting up computer servers (sucs)
Setting up computer servers (sucs)
 
Name Services and Domain Name System
Name Services and Domain Name SystemName Services and Domain Name System
Name Services and Domain Name System
 
Secure shell (ssh)
Secure shell (ssh)Secure shell (ssh)
Secure shell (ssh)
 
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
abusing dns to spread malware:from router to end user(滥用dns传播恶意软件:从路由器到最终用户)-...
 
How domain name servers work
How domain name servers workHow domain name servers work
How domain name servers work
 
Pmw2 k3ni 1-3a
Pmw2 k3ni 1-3aPmw2 k3ni 1-3a
Pmw2 k3ni 1-3a
 

Recently uploaded

Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech studentsHimanshiGarg82
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 

Recently uploaded (20)

Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 

Dns Changer Malware

  • 1. DNS Changer Malware Surun Infocore Systems
  • 2. DNS? (What is that?) Before Understanding DNS Malware – Lets revise some important basics…
  • 3. DNS Domain Name System : • As per Wiki – – The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. – A Domain Name Service translates queries for domain names (which are meaningful to humans) into IP addresses for the purpose of locating computer services and devices worldwide. (This is where the real problem starts) – The Domain Name System makes it possible to assign domain names to groups of Internet resources and users in a meaningful way, independent of each entity's physical location. Because of this, World Wide Web (WWW) hyperlinks and Internet contact information can remain consistent and constant even if the current Internet routing arrangements change. (This is the secrete essence of this problem)
  • 4. DNS Server DNS Server: • DNS Server its important entity in translating IP Address into hostnames (website names) or vice versa (hostnames to IP Address) • Translating domain names/hostnames (websites) to IP addresses is known as Forward DNS. • Translating IP addresses to domain names/hostnames (websites) is known as Reverse DNS. • Let us understand how DNS Servers exactly work by illustrating it with an example
  • 5. DNS Server I need direction to connect to www.Google.com The domain name www.Google.com is not my database, I will check with other DNS Server DNS Server Hey as per my database www.Google.com is mapped at following IP Address 74.125.236.201 1 2 3 4 www.Google.com server (IP = 74.125.236.201) 5 Hey, thank you for direction, now I can connect to google.com Working of DNS Server
  • 6. IP Address Configurations IP Configuration: • Two methods are widely used to configure your computer`s IP Address – Dynamic • For user Dynamic IP Address Configuration is comparatively very easy because honestly user don’t have to do anything here apart from clicking to “Obtain an IP Address Automatically” and then the system will automatically sets IP address . • Also like same, we can “Obtain DNS Server Address Automatically” • Some Internet Service Providers (like Reliance Internet Connections, Tikona net connections) prefer this kind of setting in your computer. – Static • In this case the IP address is assigned to the system, so that machine will have unique identification. • We can set DNS Server also in same manual assignment method. • Please note – here IP address you can set depending upon your network settings in office or home, but you need to strictly input the DNS server details as provided by your Internet Service Provider only, if you change it to anything else, then there is wide scope that Internet will not function
  • 7. IP Address Configurations Static IP Configuration for DNS provided by ISP BSNL (Pune): To check further settings click to Advance (Here the real problem definition starts)
  • 8. IP Address Configurations Static IP Configuration for DNS provided by ISP BSNL (Pune):
  • 9. DNS Changer Malware DNS Changer Malware: • The meaning of Malware – Malfunction Software – – Any software which can introduce malfunction in system is known as Malware. – This DNS Changer malware, put additional DNS Server address into IP Address configurations, along with your regular DNS server Address. – So , it will be very clear that, when ever user tries to connect to any website the DNS Server reads his / her request (to connect to website) and re-direct the user to any other websites, which may be harmful to your computer, like Adware websites. – The meaning of Adware – Advertisement Software • Any software which is responsible for showcasing various online advertisements on your computer are known as Adware. • Example of such advertisements will be.. “Your computer is infected with Viruses.. Please Scan your Computer with our latest Online Antivirus FREE” and once user respond to this advertisement, the fake antivirus will get installed in users system and it will open gateway for more other viruses and Trojans
  • 10. Problematic DNS Server I need direction to connect to www.Good-Website.com I am a Problematic DNS Server, I will redirect this use to other website 1 2 3 (Problematic websites, which may steal personal details like passwords and may download other viruses in system)
  • 11. DNS Changer Malware Identifications: • Detection of this DNS Changer malware is made easy by some online websites. You just have to visit http://dns-ok.us/ • The little bit tricky method (which I found when I was with this virus) – Try to open website of any famous antivirus company – This virus will not allow you open it. – But rest all other websites will work superfine – (Smart.. Yeah.. !!) • For Advanced Users the more tricky method is explained on next slide
  • 12. DNS Changer Malware Identifications (For Advanced Users): • Go to command prompt • Execute – ipconfig /all • Check for DNS Server • It has been observed if DNS server IP Address is indicating, IP Address any of following range then system is infected with this malware From To 77.67.83.1 77.67.83.254 85.255.112.1 85.255.127.254 67.210.0.1 67.210.15.254 93.188.160.1 93.188.167.254 213.109.64.1 213.109.79.254 64.28.176.1 64.28.191.254