<<<
Chronological Index
>>> <<<
Thread Index
>>>
Re: [dssa] Operation Ghost Click
- To: "dssa@xxxxxxxxx" <dssa@xxxxxxxxx>
- Subject: Re: [dssa] Operation Ghost Click
- From: Don Blumenthal <dblumenthal@xxxxxxx>
- Date: Thu, 10 Nov 2011 09:08:08 -0500
An outstanding example of law enforcement work. It was met with great applause
at the AntiPhishing Working Group meetings that I'm attending in San Diego.
Don
DON M. BLUMENTHAL, Esq.
Senior Policy Advisor
.ORG, The Public Interest Registry
Direct: +1 734 418-8242 | Mobile: +1 202 431-0874 | Skype: donblumenthal |
From: Rossella Mattioli
<rossella.mattioli@xxxxxxxxx<mailto:rossella.mattioli@xxxxxxxxx>>
Date: Thu, 10 Nov 2011 05:28:15 -0500
To: "dssa@xxxxxxxxx<mailto:dssa@xxxxxxxxx>"
<dssa@xxxxxxxxx<mailto:dssa@xxxxxxxxx>>
Subject: [dssa] Operation Ghost Click
Hi everyone,
I want to share with you the news of the day about DNS: Operation Ghost Click
https://krebsonsecurity.com/2011/11/malware-click-fraud-kingpins-arrested-in-estonia/
the main point is that they are using a trojan "DNSChanger" that changes the
infected system's Domain Name Server (DNS) settings, in order to divert traffic
to unsolicited, and potentially illegal sites"
https://www.f-secure.com/v-descs/dnschang.shtml and they have affected more
than four million computers in over 100 countries.
More info are available here:
http://www.fbi.gov/news/stories/2011/november/malware_110911/malware_110911
http://www.fbi.gov/news/stories/2011/november/malware_110911/DNS-changer-malware.pdf
Best regards,
Rossella
<<<
Chronological Index
>>> <<<
Thread Index
>>>
|