SecurityRisk.FlushDNS

Printer Friendly Page

Discovered: June 08, 2012
Updated: June 28, 2012 9:20:55 AM
Type: Other
Systems Affected: Windows

SecurityRisk.FlushDNS is a detection for DNS IP addresses known to be associated with Trojan.Flush.K (DNSChanger).

Antivirus Protection Dates

  • Initial Rapid Release version October 02, 2014 revision 022
  • Latest Rapid Release version October 02, 2014 revision 022
  • Initial Daily Certified version June 09, 2012 revision 016
  • Latest Daily Certified version June 09, 2012 revision 016
  • Initial Weekly Certified release date June 13, 2012

Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

Discovered: June 08, 2012
Updated: June 28, 2012 9:20:55 AM
Type: Other
Systems Affected: Windows

SecurityRisk.FlushDNS is a detection for DNS IP addresses known to be associated with Trojan.Flush.K (DNSChanger).

DNS settings of compromised computers are modified to connect to DNS servers known to be associated with Trojan.Flush.K (DNSChanger). These DNS servers have been seized and taken control of by the FBI.

On July 9, the FBI plans to shut these servers down. Once this happens, all computers that continue to connect to these servers will lose Internet access. Please see our removal instructions to ensure your Internet service is not disrupted after the deadline.

Discovered: June 08, 2012
Updated: June 28, 2012 9:20:55 AM
Type: Other
Systems Affected: Windows

To reset the DNS settings for the computer, if using DHCP

Note:

  • If your computer is using DHCP, you can modify the DNS settings to automatically obtain a DNS server address. You can specify this option by changing the properties of your network connection. If your computer does not use DHCP, or you are unsure of what this means, please contact your network administrator or Internet Service Provider (ISP).
  • These instructions are for Windows 7. If you are using a different operating system, the instructions and screen shots listed below may differ.

1. Click Start > Run...




2. Type ncpa.cpl and click OK




3. Right click Local Area Connection and click Properties




4. Select Internet Protocol (TCP/IP) and click Properties




5. Select Obtain DNS server address automatically and click OK > OK