What is the botnet?

and Botnet ("RO Bot Net ) refers to multiple computers infected with remote controlled software that allows one hacker to run automated Botnet programs behind the back of users. Remotely inspected software or rootkit is secretly installed on every computer, hiding its presence and traces, making it difficult to detect. Meanwhile, the hacker can use a botnet for many purposes, including spam distribution, spreading Trojan horses, maintaining phishing fraud, or collecting information for theft or fraud.

When a compromised computer falls on prey to rootkit, the computer is referred to as a "zombie computer". Hacker can install rootkits on many computers and basically build a network of compromised "zombies of computers" to run secret robots or hacker services. There is a big competition in the underground alcove of botnet operators that has the largest or strongest botnet. Not only are the individual Coohonled MPUTERy, but also networks of the main private societies, government and even armies.

Botnets are the main source of crime on the Internet. Some operators "rent" their botnets per hour to spammers. Internet service providers (ISP) prohibit spaming, but when thousands or hundreds of thousands of machines send five or ten pieces of spam, SPAMMER escapes alert. In addition, spam sent via the traces of the botnet back to compromised computers, not to the spammer.

Botnets are also used to maintain phishing fraud by sending e -mails that seem to come from legitimate companies such as financial institutions, eBay or PayPal. E -mail usually asks for sensitive personal data that victims often provide. This information goes directly to the Botnet operator for personal profit.

The operator can also use a botnet to start a distributed rejection (DDOS) attack on the web. AfterCounters in Botnet are sent by a command that invites them to contact a specific website simultaneously. This can cause the server to collapse from the overload of the operating requirements. Getting the server and the site back online can take time and disrupt your business. DDOS attacks are often carried out against large, well -known companies and reportedly were worth worth millions.

Click-Fraud is another fraud committed by some botne operators. Advertisers usually pay a small fee for each click on an advertised link that appears on the website. The Botnet operator with an advertising contract in a personal domain can send a compromised network command to automatically click on an advertising link whenever the browser is open. Since the botnet can be very large, for advertisers is a considerable problem of clicking.

In October 2005, the Dutch police uncovered the main botnet disadvantages of 1.5 million compromised computers. Zombie network was reportedly pequated by three individuals at the age of twenty. Botnets become more widespread when the United States believes they are the most affected country, and some estimates contain about 26% of all botnets. Up to 25% of all American computers can be part of the botnet, even if it is difficult to know if such statistics are accurate.

What is certain that the botnets are widespread and grow, even attract teenagers known as "script children" who compete in building botnets. As a result, witnesses and administrators take steps to protect against rootkits that pass access to hackers and scriptical children. Anti-rootkit software can be used to scan existing rootkits, and other preventive measures can also be taken to minimize the risks of being part of the botnet.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?