Tens of thousands of people around the world whose computers were infected with malware last year may lose their Internet access when a US government fix expires, security experts say.
The problem stems from malware known as DNS Changer, which was created by cybercriminals to redirect Internet traffic by hijacking the domain name systems of Web browsers.
The ring behind the DNS Changer virus, discovered in 2007, was shut down last year by the US Federal Bureau of Investigation (FBI), Estonian police and other law enforcement agencies.
Because the virus controlled so much Internet traffic, authorities obtained a court order to allow the FBI to operate replacement servers which allow traffic to flow normally, even from infected computers.
But those replacement servers will be shut down at 0401 GMT Monday, when some experts say infected computers will face an “Internet doomsday”.
“DNS Changer is an insidious form of malware affecting everyone from the everyday consumer to a large chunk of the Fortune 500,” said Lars Harvey, the chief executive of security firm Internet Identity.
The FBI, Facebook, Google, Internet service providers and security firms have been scrambling to warn users about the problem and direct them to fixes.
According to a working group set up by experts, more than 300,000 computers remained infected as of June 11.
The largest number were in the United States (69,000), but more than a dozen countries — including Italy, Germany, India, Britain, Canada, France and Australia — are also believed to have infected computers.
Security experts say it’s not clear how many of those computers are active.
“Reaching victims is a very hard problem, and something we have had issues with for years,” said Johannes Ullrich, a researcher with the SANS Security Institute.
But he said he expected the impact to be “minimal” because many of these systems are no longer used or maintained.
Internet Identity said last week that at least 58 of all Fortune 500 companies and two out of 55 major government entities had at least one computer or router that was infected with DNS Changer.
That’s an improvement over January, when half of Fortune 500 companies and US federal agencies were infected.
IID said that the malware also compromises computers by preventing antivirus software updates.
Users who think they are infected may perform a test at the DNS Changer Working Group’s website http://www.dcwg.org/ or others operated by various security firms.
For computers affected, the blackout will be total, experts say.
“Connectivity will be lost to the Internet PERIOD,” said a blog posting from the security firm Symantec.
Six Estonians and a Russian were charged last November with infecting computers, including NASA machines, with the malware as part of an online advertising scam that reaped at least $14 million.