Operation Ghost Click DNS servers to remain online until July

http://asset0.cbsistatic.com/cnwk.1d/i/tim/2012/03/07/population_270x203.png

Last year’s DNSChanger malware scam was an effort by a small crime ring of Estonian nationals to steal personal information. The scam worked by distributing malware that when installed would change the user’s DNS settings to point to the crime ring’s rogue DNS network. Since the DNS system is essentially the Internet’s phone book, this allowed the crime ring to route seemingly valid Web site URLs to malicious servers.

Read more: Operation Ghost Click DNS servers to remain online until July

Story added 9. March 2012, content source with full text you can find at link above.