Operation Ghost Click nails $14m Estonian DNSChanger botnet

Six Estonians and one Russian have been arrested in connection with a massive botnet that is believed to have raked in more than $14m over the past four years. Operation Ghost Click targeted the botnet with the cooperation of the FBI and Estonian police, with around 4m computers around the world believed to have been infected.

The DNSChanger worked by redirecting people when they searched for iTunes or the US Internal Revenue Service (IRS). Both Windows and Apple machines were vulnerable to the malware, which earned its operators money by giving them fees for sending people to certain sites. For example, someone searching for the Apple iTunes store would be misdirected to another online music store.

It was NASA, somewhat bizarrely, who first noted the existence of the botnet, with a number of the agency’s computers allegedly infected. Anyone who wants to check whether they were affected by the DNSChanger can follow these instructions, which are a little complicated but should do the job.

About Michael R. Gideon

Writer, teacher, dog walker, guitarist, husband, father, reader, journalist etc. I mainly write at 100gf | Politics and Computers, but occasionally at other sites such as TV Vomit and Indie Bookspot. My Google Plus profile.


No comments yet.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

For the latest news

Follow 100gf on Twitter

Subscribe to 100gf | Politics and Computers. Warning: Usually more than 30 posts per day!

%d bloggers like this: