The court order that would allow for the extenuation of the deadline up to July 9 has still not been granted, so the government has asked the help private sector companies and has employed Einstein, its own threat-monitoring system, in order to pinpoint the affected computers.
Einstein was fed with a number of indicators for the malware, and set loose on 17 of 19 agencies that are planned to be combed through, reports NextGov. According to researchers involved in the clean-up process, the malware was found on at least one computer in 27 of the 55 government departments that were checked.
"DHS identified infected agencies by leveraging multiple sources to ensure we have the most comprehensive accounting of machines infected within the dot-gov," DHS spokesman Peter Boogaard said, not confirming or denying the aforementioned numbers. "Each organization is actively implementing mitigation strategies to alleviate infections."
The initial exchange of the botnet's servers with the clean ones was executed so that ISPs could detect victims and instruct them on how to remove the malware from their computers. Unfortunately, the process was slow and time is running out.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.