Telstra customers get DNSChanger redirection
- 09 July, 2012 14:45
Telstra customers who may be affected by the DNSChanger server switch off have been thrown a temporary lifeline by the telco giant.
DNSChanger servers set up by the Federal Bureau of Investigation (FBI) are due to be shut down today, with the Australian Communications and Media Authority (ACMA) estimating that 6000 Australians could lose access to the internet. DNSChanger altered computers’ Domain Name Systems server settings, allowing the rerouting of traffic in the process of translating a domain name to an IP address.
In a blog posting, Telstra chief information security officer, Glenn Chisholm, said that the company had established a temporary network solution that will redirect infected customers away from the DNSChanger servers to Telstra’s BigPond domain name system (DNS) servers so that customers can still browse the internet.
“In simple terms, this redirection overcomes the hijacking of their domain name requests by the malware and allows Telstra to respond to these queries,” wrote Chisholm.
“Once infected customers change their DNS settings to any legitimate server, whether provided by Telstra or a third party, the redirection will cease.”
The IP address ranges which are being redirected include:
He added that the redirection only applies to BigPond asymmetric digital subscriber line (ADSL), cable, wireless and fibre to the premises (FTTP) customers.
“This redirection will enable us to continue to be able to identify infected customers so we can continue to work closely with them and help them remove the malware and fix their DNS settings,” wrote Chisholm.
Follow Hamish Barwick on Twitter: @HamishBarwick
Follow CIO Australia on Twitter: @CIO_Australia
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Tolly Report: Performance Survey of Virtual Environment Security
This report by Tolly tests the system resource requirements of competing vendor solutions when performing on-demand and on-access scanning functions, during distributed definition updates. Click to download how the four competing options ranked against each other.
HP Helps NEC Reduce Network Management Costs and Gain Efficiencies
NEC wanted to reduce network management costs, while increasing network visibility, decreasing mean-time-to-repair, improving stability and mitigating the risk of downtime. Download today to hear from Cameron Craig, Senior department manager of NEC on what approach they took and why.
Managing the Rapid Rise in Database Growth: 2011 IOUG Survey on Database Manageability
As the era of “Big Data” marches on unabated, data is coming from an ever wider range of sources, including transactional systems, mobile devices, sensors, streaming media, and social networks. Businesses are looking for innovative ways to better leverage terabytes—and for some, petabytes—of information. Read more.