A rumor repeated enough times on the Web is too often given the same status as truth. Then, by the time the rumor is discredited, the story is old and dead anyway, and the next rumor has taken hold. Take the case of the DNSChanger Trojan. Last November, as RWW's David Strom first reported, the FBI indicted seven men suspected of involvement with an Estonian malware distribution firm. That malware, which plagues U.S. Government systems to this day, simply changed PCs' DNS server settings to point to those operated by the firm. And that firm directed unsuspecting users to sites containing ads that the firm hosted, and allegedly profited from.
Naturally, you'd want to shut that down. The problem last November was, doing this would disrupt Internet service to users worldwide, including government systems believed to have been targeted. So the FBI sought and received a court's permission to have a well-respected non-profit group run legitimate DNS servers at the same addresses, up until the addresses changed by the Trojan could be replaced. That lease was set to expire tomorrow, and as it turned out, it wasn't enough time. Sensationalist news sources just love a countdown - if it's ticking, it must be a time bomb.
"FBI might shutdown the Internet on March 8," read RT.com, the Russian news service which also carried President-Elect Vladimir Putin's comments that political protestors are only there to get beaten up by police and get caught on camera. London's Daily Mail carried essentially the same headline, though added the obligatory question mark. Local U.S. television news followed suit, though by answering the question mark with essentially, "Of course not! What, you think the government's that stupid?"
On Monday, a federal judge in New York granted the FBI's request to extend Internet Systems Consortium's lease of the temporary servers for another 120 days, until July 9. As I told NTN24's Monica Fonseca on today's C.S.T. program in Colombia, this will give the government and other folks that much more time to change their DNS server settings to those that did not belong to the suspect firm's group of rogue sites.
According to the FBI's indictment, here is the complete list of ranges of DNS addresses that pointed to the suspect firm's rogue servers:
18.104.22.168 through 22.214.171.124
126.96.36.199 through 188.8.131.52
184.108.40.206 through 220.127.116.11
18.104.22.168 through 22.214.171.124
126.96.36.199 through 188.8.131.52
184.108.40.206 through 220.127.116.11
18.104.22.168 through 22.214.171.124
126.96.36.199 through 188.8.131.52
184.108.40.206 through 220.127.116.11
The FBI published a brochure (PDF available here) explaining in general terms how users' systems were affected, and what steps they can take to remedy the problem and return their Internet access to normal. These directions apply to Windows XP, Windows Vista, Windows 7, and Mac OS X users. The brochure explains how the rogue servers were able to masquerade as DHCP servers as well, instructing victims' PCs in how to change their DNS server addresses without having to hack into them to do so.