Operation Ghost Click

Kyle Creyts kyle.creyts at gmail.com
Thu Apr 26 16:57:36 CDT 2012


http://www.fbi.gov/news/stories/2011/november/malware_110911/DNS-changer-malware.pdf
On Apr 26, 2012 5:48 PM, "Leigh Porter" <leigh.porter at ukbroadband.com>
wrote:

>
> On 26 Apr 2012, at 22:47, "Andrew Latham" <lathama at gmail.com<mailto:
> lathama at gmail.com>> wrote:
>
> On Thu, Apr 26, 2012 at 5:38 PM, Jeroen van Aart <jeroen at mompl.net<mailto:
> jeroen at mompl.net>> wrote:
>
> Yes its a major problem for the users unknowingly infected.  To them
> it will look like their Internet connection is down.  Expect ISPs to
> field lots of support s
>
> Is there a list of these temporary servers so I can see what customers are
> using them (indicating infection) and head off a support call with some
> contact?
>
> --
> Leigh
>
>
> ______________________________________________________________________
> This email has been scanned by the Symantec Email Security.cloud service.
> For more information please visit http://www.symanteccloud.com
> ______________________________________________________________________
>


More information about the NANOG mailing list