Copio y pego directamente del CERT Advisor:
"US-CERT Current Activity
DNSChanger Malware
Original release date: Tuesday, April 24, 2012 at 2:20 pm
Last revised: Tuesday, April 24, 2012 at 2:20 pm
US-CERT encourages users and administrators to ensure their systems are
not infected with the DNSChanger malware by utilizing tools and
resources available at the DNS Changer Working Group (DCWG) website.
Computers testing positive for infection of DNSChanger malware will need
to be cleaned of the malware in order to maintain continued internet
connectivity beyond July 9, 2012.
On November 8, 2011, the FBI, NASA-OIG, and Estonian police arrested
several cyber criminals in "Operation Ghost Click." The criminals
operated under the company name "Rove Digital," and distributed DNS
changing viruses, variously known as TDSS, Alureon, TidServ, and TDL4
viruses.
Additional information about Operation Ghost Click and the DNSChanger
malware is available at the FBI website.
Relevant Url(s):
<http://www.dcwg.org/>
<http://www.fbi.gov/news/stories/2011/november/malware_110911>
__________________________________________________ __________________
Produced by US-CERT, a government organization.
__________________________________________________ __________________
This product is provided subject to the Notification as indicated here:
http://www.us-cert.gov/legal.html#notify
This document can also be found at
http://www.us-cert.gov/current/#dnschanger_malware
For instructions on subscribing to or unsubscribing from this
mailing list, visit
http://www.us-cert.gov/cas/signup.html ".
Esto os pasa por abusar de los güindoses...