[Read: DNSChanger Malware: What’s Next?]
DNSChanger caused a panic because it was routing Internet traffic through rogue servers, which the Federal Bureau of Investigation seized and shut down in late 2011. The FBI was hosting surrogate servers to keep infected users online, but pulled the plug on Monday, forcing users to get clean or risk losing their connections.
But as of Sunday night, the FBI estimated that only 41,800 computers remained infected by DNSChanger, the Associated Press reports, and some Internet service providers are offering their own solutions to keep customers online. It’s safe to say the cutoff day has been free of catastrophes. “We’re not aware of any issues,” FBI spokeswoman Jenny Shearer told the Boston Globe.
The Warnings Worked
As of February, half of all Fortune 500 companies owned computers infected with DNSChanger, and an estimated 350,000 computers around the world were still infected.
I first wrote about DNSChanger in April, but by then, the FBI’s original cutoff date had already passed. A federal judge extended the deadline from March to July because not enough people were aware of the situation.
So the FBI stepped up its campaign, dramatic headlines ensued, and people started to pay attention. Stories written about DNSChanger got heaps of traffic, even outside the tech world. The story was covered on the radio and on television. It even passed one of my favorite litmus tests for whether a tech story has gone mainstream: My mother-in-law asked me about it.
Without that level of attention, more people might have lost their connections today, including employees at major corporations and government agencies. Of course DNSChanger fizzled; that was the point.
Still, I’d like to think the same effect could be achieved without inaccurate headlines claiming the sky was about to fall.
Follow Jared on Twitter, Facebook or Google+ for even more tech news and commentary.