Facebook alerts owners of DNSChanger-infected computers that they need to take action before July 9 Facebook has started notifying victims of the DNSChanger malware who visit the social networking site that their computers will be cut off from the Internet on July 9, if they don’t clean them until that time.Facebook’s DNSChanger alerts will include a link the DNSChanger Working Group’s website, which contains more information about the malware and instructions on how to remove it.“Earlier this year, Facebook joined the clean up effort by participating in [http://www.dcwg.org DNSChanger Working Group], which is comprised of computer security experts from the public, private, and academic sectors,” the Facebook security team said in a blog post on Monday. “As a result of our work with the group, Facebook is now able to notify users likely infected with DNSChanger malware and direct them to instructions on how to clean their computer or networks.”DNSChanger is a family of Trojan programs that hijack Web search queries, display malicious advertisements and redirect users to fake websites. They do this by forcing infected computers to use DNS servers controlled by attackers. DNS servers play a very important role on the Internet — they translate domain names into numerical Internet Protocol (IP) addresses that computers use to communicate with each other. By default, most computers use DNS servers operated by their respective Internet service providers (ISPs) — entities that are implicitly trusted with routing their connections.The FBI shut down the DNSChanger operation in November 2011 following a two-year investigation and temporary replaced the rogue DNS servers with legitimate ones. The replacement servers are operated by a non-profit organization called the Internet Systems Consortium, which also operates one of the Internet’s thirteen authoritative DNS root servers. A judge initially signed off on this arrangement until March 8 in order to give ISPs sufficient time to identify and notify victims. However, the deadline was later extended by four months.The replacement servers are now scheduled to be taken offline on July 9, after which time computers still infected with the DNSChanger malware will no longer be able to access the Internet.The DNSChanger Working Group estimates that there are over 350,000 devices still infected with DNSChanger, out of the 4 million that were originally affected by the malware.Facebook’s decision to notify the owners of the remaining infected computers follows a similar decision by Google, which started alerting DNSChanger victims through its search pages on May 22. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe