Select Country

Australia flag Australia Canada flag Canada/English Germany flag Deutschland Spain flag España France flag France China flag Hong Kong India flag India Ireland flag Ireland Netherlands flag Nederland New Zealand flag New Zealand Portugal flag Portugal South Africa flag South Africa Switzerland flag Schweiz Switzerland flag Suisse United Kingdom flag United Kingdom United States flag United States Japan flag 日 本 ×

What are Bots, Botnets and Zombies?

News about internet crimes often mentions ’bots’, ’zombies’, and ’botnets’. It’s not hard to figure out from the context that these are computer or network security threats. But what exactly are they, how do they work, and what damage do they cause?

A ’bot’, short for robot, is a type of software application or script that performs tasks on command like indexing a search engine, and they are really good at performing repetitive tasks.

Bad bots perform malicious tasks allowing an attacker to take complete control over an affected computer for the criminal to control remotely. Once infected, these machines may also be referred to as ’zombies’.

Taking over one computer is useful, but the real value to a criminal comes from collecting huge numbers of computers and networking these (a botnet) so they can all be controlled at once and perform large scale malicious acts.

As of August 2011 there are between 100-150 million computers worldwide (out of 600 million PCs on the Internet) infected with bots and under the control of hackers. These computer owners unwittingly put everyone at risk, and most would be shocked to learn that the spam you’re receiving is coming from thousands or even millions of computers just like (and including) theirs. The real owners of those computers can still use them, and they are probably unaware of anything being wrong except perhaps they think their computer seems slow at times.

One botnet, called Rustock, was disabled through collaboration between industry and law enforcement in March of 2011. This botnet had approximately 1 million infected computers networked together, and was capable of sending up to 30 billion spam emails a day.  This botnet was so large that when it was taken down, global spam volumes instantly dropped by 30 percent.

It only takes minutes for an unprotected, internet connected computer to be infected with malicious software and turned into a bot, underscoring the critical need for every computer and smartphone user to have up-to-date security software on all their devices.

Cybercriminals make money from their botnets in several ways:

Revenue from DoS attacks comes through extortion (pay or have your site taken down) or through payments by groups interested in inflicting damage to a company or network. These groups include "hacktivists" — hackers with political agendas as well as foreign military and intelligence organizations.

Don’t let your computer become a bot

If you have not installed security software and ensured that it is turned on, and kept up-to-date your machine is likely infected with all kinds of malicious software, including bots. The best protection is to set your anti-virus and anti-spyware programs to automatically update, and to install every patch that your operating system and browser make available.

Even the most up-to-date protection tools cannot protect you from everything; there is still some risk because the developers of malware are always looking for new ways to get around security measures, and there is the risk of infection because of actions you, or another person who used the computer, take.

A common user risk comes through downloading content from unknown sites OR from friends that don’t have up-to-date protections. The intent may not be malicious at all, but if content comes from an unprotected computer it may well be infected. By downloading the content you bring the malicious code past your security checkpoints where they can try to clean the malware off your machine, but they have no way of defending against it being downloaded in the first place. Always use extreme caution when downloading information or files from someone whose computer is not protected.

Provided by Linda Criddle, Founder of iLookBothWays.com