DNSChanger impact less than expected in Australia
- 11 July, 2012 09:25
Australia has been spared the brunt of the DNSChanger malware internet blackout, according to reports from major internet service providers (ISPs).
The temporary DNS solution operated by the Internet Systems Consortium was switched off at 2pm on 9 July 2012 (AEST). As a consequence, DNSChanger was expected to cause an internet black out for many consumers around the world including approximately 6500 users in Australia.
However, the major ISPS did not experience a peak in call centre enquiries.
iiNet chief technical officer, John Lindsay, told Computerworld Australia that only 200 iiNet customers were still affected by DNSChanger at the start of the week. “We’re not seeing any ongoing attempts to connect to it so it was a big non-issue. We’ve been informing customers about DNSChanger since the beginning of the year,” he said.
An Optus spokeswoman said the company did not experience any peaks in customer enquiries to its call centre.
Telstra established a temporary network solution that redirected infected customers away from the DNSChanger servers to Telstra’s BigPond domain name system (DNS) servers so that customers could still browse the internet.
A Telstra spokeswoman said in a statement that approximately 1600 unique customers were redirected.
“We expect that the number will only slowly increase from here. In the last 24 hours since 9 July, the number of redirects increased by only 100,” she said.
“We have not yet determined an end date for the redirection and we will continue to assess the need based on the number of customers affected.”
According to an Australian Communications and Media Authority (ACMA) spokesperson, if a Telstra customer visits the DNSChanger Diagnostic website, the site will continue to perform an automatic diagnosis to test whether or not they are infected by DNSChanger.
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- The TCO and Security of Enterprise Grade Mobility
- Definitive Guide to Next-Generation Threat Protection
- The Trend Ready Program for Cloud Service Providers
- Easing The Transition To A Virtual Endpoint Infrastructure
- Businesses are ready for a new approach to IT - Simplify deployment and reduce complexity using systems integrated with expertise
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
Hybrid IT Service Management: A Requirement for Virtualisation and Cloud Computing
When competition is tough and resources are limited, corporate leaders are depending on growing their existing capabilities in order to grow their business. Information technology can be a unique catalyst for business growth, delivering a competitive advantage when creatively applied to established and emerging problems. Read more on what trends are accelerating the value of IT.
Advanced Malware Exposed
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. This ebook will provide readers with a new understanding of the rapidly developing cyber threat landscape and practical insights into how they can protect their data and computing infrastructures. Download now.