With only a couple of days to go until the backup DNS servers are shut down, there are still around 250,000 computers worldwide infected with the infamous DNSChanger Trojan.
Initially, there were 4 million devices affected by the piece of malware that redirected internauts to malicious websites each time they attempted to visit a certain domain. After the Estonian masterminds were apprehended by the FBI, the DNSChanger Working Group was established and the cleaning process began.
The last count made by the DNSChanger Working Group showed 69,517 victims in the US, over 26,000 in Italy, 21,000 in India, and just under 20,000 in the UK and Germany. In Australia there are around 6,000 victims.
On the other hand, there is some good news for a number of users. Some ISPs from the United States and Australia have implemented other temporary redirections to make sure that their customers will remain connected to the Internet even after July 9.
“Telstra is engineering a temporary network solution to redirect Internet traffic away from the FBI servers targeted for deactivation. The redirection is temporary, but will give us more time to contact these customers and help them to remove the malware and fix their DNS settings,” the Australian telecoms giant explained in an advisory.
If you are among those who will lose their Internet connection on Monday, it’s still not too late since the cleaning process is easy and requires little skill. Take a look at this video made by Sophos , which explains the steps that you must take in order to address this issue: