D
David H. Lipman
Guest
Re: dnsChange virus SOLVED...
From: "Leythos"
| If you had disabled UPNP, not used the default network subnet, not used
| the default password or not provided the password to some program, it
| could not have changed it.
| Disable UPNP, change from 192.168.0.1 to 192.168.128.1 on the router,
| change the password, update the firmware if possible.
Flashing the FirmWare is not needed.
As of yet, I have not heard of uPnP or other protocols being used to bypass authentication
at TCP port 80. This trojan uses a luandry list of known default passwords.
I don't think that changing the default IP address would help. Lets assume that you did
and the default password was still in place. Nodes getting a DHCP lease would obtain the
IP address of the Router and the trojan would still exploit the weak and known password.
--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp
From: "Leythos"
| If you had disabled UPNP, not used the default network subnet, not used
| the default password or not provided the password to some program, it
| could not have changed it.
| Disable UPNP, change from 192.168.0.1 to 192.168.128.1 on the router,
| change the password, update the firmware if possible.
Flashing the FirmWare is not needed.
As of yet, I have not heard of uPnP or other protocols being used to bypass authentication
at TCP port 80. This trojan uses a luandry list of known default passwords.
I don't think that changing the default IP address would help. Lets assume that you did
and the default password was still in place. Nodes getting a DHCP lease would obtain the
IP address of the Router and the trojan would still exploit the weak and known password.
--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp