wiredmikey (1824622) writes "Despite the recent success in taking down a criminal operation that operated a massive DNSChanger malware operation, new research shows that the malware is still prevalent and lingering in many corporate and government networks.
In fact, according to recent analysis, approximately half of all Fortune 500 companies and major U.S. federal agencies are infected with DNSChanger malware.
Security firm IID says that it found at least 250 of all Fortune 500 companies and 27 out of 55 major government entities had at least one computer or router that was infected with DNSChanger in early 2012.
If an enterprise’s employee has DNSChanger on their computer, it means that enterprise is susceptible to having their proprietary information stolen because DNSChanger disables Anti-Virus.
While the FBI replaced rogue DNS servers operated by the cybercriminals with legitimate servers for 120 days, without further court actions, on March 8, 2012, infected computers and routers will have no servers to handle their DNS requests, the Internet may literally go dark for people using those computers or routers and create a major help desk issue."
Link to Original Source