Trojan.DNSChanger

Short bio

Trojan.DNSchanger is Malwarebytes’ generic detection name for Trojans that change a systems’ DNS settings without the user’s knowledge or consent.

Type and source of infection

Once the systems are infected by Trojan.DNSChanger and their DNS settings modified, systems use foreign DNS servers set up by the threat actors. Infected systems that attempt to access specific sites are redirected to sites specified by these threat actors.

Domain Name System (DNS) is known as an Internet standard for the assignment of Internet Protocol (IP) addresses to domain names. Simply put, DNS interprets human-friendly host names to PC-friendly IP addresses.

It is common for users to automatically use DNS servers operated by their ISPs. Users who prefer more secure, faster, and reliable DNS servers usually go with a third-party service as ISP-administered DNS servers can be slow and unreliable.

DNS changers/hijackers are sometimes bundled with other malware, such as rootkits, for example in the old TDSS family. Fake antivirus (FakeAV) programs have also been used to spread DNS changer Trojans, as seen in Rove Digital.

Protection

Malwarebytes protects users from Trojan.DNSChanger by using real-time protection.

block Trojan.DNSChanger

Malwarebytes blocks Trojan.DNSChanger

Home remediation

Malwarebytes can detect and remove Trojan.DNSChanger without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click MBSetup.exe and follow the prompts to install the program.
  3. When your Malwarebytes for Windows installation completes, the program opens to the Welcome to Malwarebytes screen.
  4. Click on the Get started button.
  5. Click Scan to start a Threat Scan.
  6. Click Quarantine to remove the found threats.
  7. Reboot the system if prompted to complete the removal process.

A reboot is often required to flush the “poisoned” DNS cache. Malwarebytes will prompt you to do this if needed.

Business remediation

How to remove Trojan.DNSChanger with the Malwarebytes Nebula console

You can use the Malwarebytes Anti-Malware Nebula console to scan endpoints.

endpoint menu Nebula endpoint tasks menu

Choose the Scan + Quarantine option. Afterwards you can check the Detections page to see which threats were found.

Nebula detections

On the Quarantine page you can see which threats were quarantined and restore them if necessary.

Nebula Quarantaine

A reboot is often required to flush the “poisoned” DNS cache.

Select your language