Expand Cut Tags

No cut tags
johncomic: (Moss)
[personal profile] johncomic
My PC is alive and well, and no re-install of anything was required, no loss of data, etc -- happy ending all round! For the curious among you, what happened (as near as I can gather) was:

my PC was hit with something called Trojan.DNSChanger which changed the static DNS number settings in my wireless router. This in essence creates a backdoor into any machine connected to my network. My anti-malware was able to detect and remove this trojan, but unable to detect or do anything about the DNS settings in my router because it's a separate distinct piece of hardware which doesn't get scanned by them. So these rogue DNS settings allowed the trojan to pop right back in as soon as it was removed -- it was never really gone. These DNS settings also allowed it to control my internet access and create such problems as the Google misdirections, the “unable to connect to anti-malware websites”, etc.

This also meant that when I took my PC into the shop, they couldn't find anything wrong and couldn't duplicate the problems I was having -- because the problem was in my router, not in the PC. Hooked up to a different router, everything was working fine.

Anyhoo, Ken at the shop walked me thru how to locate and fix my DNS settings, and since then all has been peachy. What still puzzles me is why no one else I was dealing with came close to suspecting the true nature of the problem? I'm wondering if this “bug that can attack hardware other than your PC” is a relatively new development in malware. In which case, should I feel honoured to be one of their first test cases?

Date: 2010-04-20 06:58 pm (UTC)
susandennis: (it)
From: [personal profile] susandennis
Holy mackrel!! That is amazing and very frightening. Is there anything you can do to make sure it doesn't happen again, or said a different way, how in the hell can I make sure it doesn't happen to me???

and

I'm so glad you got it figured out before you wiped out everything.

and

I'm so appreciative of your explaining what the deal was.

Wow.

Date: 2010-04-20 07:11 pm (UTC)
From: [identity profile] johncomic.livejournal.com
Don't you use a Mac? I was under the impression that Macs are immune to such beasties...

In any event, I've gotten into the habit of peeking at my router settings every so often to make sure they haven't been changed. And I've written down the correct ones in case I need them. So if the problem comes back, I can set it right in seconds.

BTW, it's been several days since the fix and nothing has disturbed my DNS numbers again in that time. I guess it's the sort of bug that can't necessarily find it a piece of cake to get back in once it's been truly routed!

Date: 2010-04-20 11:17 pm (UTC)
susandennis: (Default)
From: [personal profile] susandennis
Oh goodness no on the Mac. I got my first ever Apple product of any kind only a couple of weeks ago when I got the iPad.

Date: 2010-04-20 08:20 pm (UTC)
From: [identity profile] ginsu.livejournal.com
I'm wondering if this “bug that can attack hardware other than your PC” is a relatively new development in malware.

Not at all. And there is a Mac version of this.

However, there's an important idea left out here. If your wireless router has a strong password required to make admin changes to it, malware installed on your PC won't be able to change the DNS settings there.

Also,

So these rogue DNS settings allowed the trojan to pop right back in as soon as it was removed -- it was never really gone.

Sort of. Even if the router's DNS info remains the same as the malware set it, that doesn't mean your PC can immediately get reinfected. It only means that certain Web sites can be blocked, or you can be steered to certain sites.

Any subsequent reinstallation of the malware would then have to happen via some other security shortcoming.

For instance, the router sends you to a site that then takes advantage of a Java or IE security hole, or you reinstall the malware more directly somehow (perhaps by running software that came from a questionable source, or running an executable disguised as an mp3 or movie).

Date: 2010-04-20 08:36 pm (UTC)
From: [identity profile] johncomic.livejournal.com
Being highly untrained in all this, my whole explanation is “sort of” when you get right down to it. I'm glad folx like you are around to provide greater precision and more solid content to my layman's vague hand gestures... I do know that Trojan.DNSChanger kept showing up every day in my scans while my DNS numbers were pooched -- however, at that time I didn't realize what its presence meant.

Date: 2010-04-20 08:54 pm (UTC)
From: [identity profile] ginsu.livejournal.com
Sure, I'm just saying

• Password-protect your router and do it with a decent password

• Watch what you double-click -- easiest way to get a Trojan installed it to disguise it as an MP3 or some other "file." The executable part can launch, do some nasty business, and then pass an actual MP3 on to a music player. So you never see what it's doing.

You might also think about something like ZoneAlarm, that will track outbound packets (i.e., sent by a Trojan and containing your bank account info), not just inbound packets like a firewall.

January 2026

S M T W T F S
    123
45678 9 10
11121314151617
18192021222324
25262728293031

Most Popular Tags

Style Credit

Page generated Feb. 6th, 2026 09:24 am
Powered by Dreamwidth Studios