
Be sure to back up your files to a flash drive or an external hard drive.The DCWG also recommends that you apply more than one removal tool, to ensure that you have completely erased the threat. If your computer is infected, the DCWG recommends you backup your files first and then use a malware removal tool, such as McAfee Stinger, Norton Power Eraser, Microsoft Windows Defender Offline, MacScan, Kaspersky Lab TDSSKill and Trend Micro Housecall. To find out if your computer is infected, use free online tests offered by the DNS Changer Work Group, the group at the forefront of the malware battle, and other groups. When the FBI arrested the malware's developers in Estonia and seized the fraudulent servers in November, the agency substituted clean servers so that infected computers would not suddenly lose Internet access. The computers then receive ads sold by developers of DNS Changer or are directed to websites of advertisers. The DNS is responsible for converting website names into the Internet protocol addresses that computers use to communicate with one another.ĭNS Changer changes the DNS settings on infected computers and reroutes Internet traffic to fraudulent servers. Kargel said Polar customers with infected computers will be given instructions on how to correct the problem by changing the Domain Name System settings on their computers. There are an estimated 64,000 infected computers in the United States. The number of infections has since receded.Īccording to the FBI, there are about 277,000 around the world, down from about 360,000 in April. "We'll be working through the weekend to contact all of them."Īt its peak, DNS Changer infected an estimated 4 million computers around the world, earning the criminals who developed it some $14 million. "We've indentified 25 business customers and 125 residential customers with the problem," he said.
