Each infected device is
called a bot or zombie.
In October 2016, a botnet called Mirai: helped trigger a wave of distributed denial-of-service (DDoS) attacks that disrupted major services across the internet. It was a wake-up call: everyday internet-connected devices-especially poorly secured IoT devices like cameras, routers, and DVRs-could be quietly hijacked and weaponised at scale.
Since then, botnets have evolved. Modern botnets aren’t just about “taking websites down.” They’re used to steal data, spread malware, commit fraud, mine cryptocurrency, deliver ransomware, and create a resilient criminal infrastructure that’s hard to dismantle. Some botnets are centrally controlled; others use peer-to-peer (P2P) designs to reduce reliance on a single command server. Many target the weakest links: outdated software, default passwords, exposed remote access, misconfigured cloud services, and unpatched routers.
This guide explains what botnets are, how they work, how they’re used, and-most importantly-what you can do to reduce the risk of your home devices or business network becoming part of someone else’s attack platform.
What Is a Botnet?
A botnet is a network of internet-connected devices that have been infected with malicious software and are controlled remotely by an attacker. Each infected device is commonly called a bot or zombie. The person controlling the botnet may be referred to as a bot herder, botmaster, or simply “the operator.”
Botnets can include:
- What Is a Botnet?
- Servers (including compromised cloud instances)
- Smartphones and tablets
- Home routers and modems
- Smart TVs
- Security cameras and DVR/NVR systems
- Smart speakers and other IoT devices
- Industrial and operational technology (in some cases)
Why Botnets Matter
Botnets matter because they give criminals three critical advantages:
1. Scale – thousands (or millions) of devices can act together.
2. Anonymity – attacks come from victims’ devices, not directly from the attacker.
3. Resilience – even if some bots are removed, the botnet can keep operating.
That combination enables everything from nuisance spam campaigns to large-scale disruption of online services.
How Botnets Work (Step by Step)
While individual botnets differ, most follow the same lifecycle.
1) Discovery: Attackers Find Targets
Attackers look for devices they can compromise. Common discovery methods include:
- Scanning the internet for open ports (e.g., remote admin panels, SSH, RDP, Telnet)
- Searching for exposed devices via public indexing services
- Targeting known vulnerable software versions
- Phishing users into installing malware
- Exploiting weak or default credentials on routers and IoT devices
IoT devices are frequent targets because they may be:
- shipped with default credentials,
- rarely updated,
- exposed directly to the internet,
- and managed inconsistently.
- Pricing pages
2) Compromise: The Device Gets Infected
A device can be infected in several ways:
- Phishing emails that trick users into opening malicious attachments or links
- Drive-by downloads from compromised or malicious websites
- Software vulnerabilities in operating systems, apps, plugins, or firmware
- Credential attacks (password spraying, brute forcing, re-used passwords)
- Supply chain issues (less common but high impact)
For IoT, compromise often looks like:
- exploiting an unpatched firmware flaw, or
- logging in with default credentials, then installing a lightweight payload.
3) Installation & Persistence
Once the malware runs, it typically:
- drops a bot payload,
- attempts persistence (so it survives reboots),
- disables security controls (where possible),
- and may download additional modules (e.g., spam, credential theft, DDoS tools).
4) Command & Control (C2): The Bot “Phones Home”
- Centralised (classic model): bots connect to one or more control servers
- Decentralised / P2P: bots communicate with each other to share commands
- Domain-based: C2 domains rotate or change using algorithms
- Social/messaging abuse: commands hidden in legitimate services (less common but seen)
- Supply chain issues (less common but high impact)
To keep C2 infrastructure alive, operators often use tactics like:
- fast-flux DNS (rapidly changing IP addresses)
- ompromised servers as relays.
- “bulletproof” hosting providers
5) Monetisation: Botnets Do the Attacker’s Work
Once the botnet is operational, the operator can “rent” it out or use it directly.
What Botnets Are Used For
Botnets are a criminal Swiss Army knife. Common uses include:
DDoS Attacks
DDoS attacks flood a target with traffic or requests to overwhelm services. Botnets are ideal for this because traffic comes from many locations, making it harder to block.
Common DDoS types include:
- Volumetric attacks (bandwidth floods)
- Protocol attacks (exploiting network stack behaviours)
- Application-layer attacks (HTTP floods that mimic legitimate users)
Spam and Phishing Distribution
Botnets can send spam at scale. Even a small portion of bots sending emails can generate huge volumes-often without the owner noticing.
Credential Theft and Account Takeover
Some botnets include modules designed to:
- capture keystrokes,
- steal browser cookies,
- harvest saved passwords,
- or intercept authentication tokens.
Ad Fraud and Fake Traffic
Botnets can generate fake ad impressions and clicks, inflating advertising spend and distorting analytics. This is especially damaging for businesses that rely on paid acquisition channels.
Malware Delivery (Including Ransomware)
Botnets are frequently used as initial access brokers-they compromise systems, then sell access to other criminals who deploy ransomware or data theft tooling.
Cryptomining
Some botnets deploy cryptominers to siphon CPU/GPU resources. On a single device, the impact may be small-but at scale, it becomes profitable.
Lateral Movement in Business Networks
In corporate environments, a compromised endpoint can be a foothold:
- scanning internal networks,
- capturing credentials,
- escalating privileges,
- moving to servers or cloud workloads.
Signs Your Device Might Be Part of a Botnet
Botnet infections can be subtle, but these indicators are common:
On computers and phones
- Unexplained slowness or overheating
- High CPU/network usage when you’re not doing much
- Security tools disabled or failing to update
- Strange browser behaviour (new extensions, redirects)
- Unexpected outbound connections (especially to unusual regions/domains)
On routers and IoT devices
- Device becomes unreliable or resets frequently
- Unexpected new admin accounts or settings changes
- Remote access settings enabled without your knowledge
- Router DNS settings changed (a major red flag)
- Unusual outbound traffic spikes, especially at odd hours
In business environments
- Multiple endpoints contacting the same suspicious domains/IPs
- Large outbound traffic volumes not tied to business activity
- Abnormal authentication attempts or lateral movement patterns
- Endpoint detection alerts for suspicious persistence or C2 activity
Why IoT Devices Are Frequently Hijacked
- Many ship with default usernames/passwords and users don’t change them
- Firmware updates may be inconsistent or difficult
- Vendors may stop supporting older models quickly
- Many devices lack strong logging and security tooling
In plain terms: IoT devices often don’t get the same security attention as computers, yet they sit on the same network-and they’re always on.
How to Protect Your Devices From Botnet Infection
The best defence is layered: reduce exposure, harden devices, and monitor for suspicious behaviour.
1) Patch and Update Everything (Yes, Everything)
- Turn on automatic updates for operating systems and browsers
- Keep apps and plugins current
- Regularly update router firmware and IoT device firmware
- Replace devices that no longer receive security updates
2) Eliminate Default Credentials and Weak Passwords
- Change default admin usernames/passwords on routers and IoT devices
- Use strong, unique passwords for all accounts
- Use a password manager to generate and store credentials
- Enable multi-factor authentication (MFA) wherever possible
- Supply chain issues (less common but high impact)
3) Reduce Internet Exposure (Close the Front Door)
- Avoid exposing remote admin interfaces to the internet
- Disable UPnP on routers (unless you truly need it and understand the risk)
- Remove unnecessary port forwarding rules
- Use a VPN for remote access instead of open admin ports
4) Use Quality Security Tools
For home users:For home users:
- reputable endpoint protection on computers
- mobile OS updates + app store hygiene
For businesses:
- EDR (endpoint detection and response)
- email filtering + phishing protection
- DNS filtering to block known malicious domains
- web filtering and application control
5) Segment Your Network (Especially IoT)
Network segmentation limits the blast radius.
- Put IoT devices on a separate Wi-Fi network/VLAN
- Prevent IoT devices from reaching sensitive systems (NAS, workstations, servers)
- Use guest networks for untrusted devices
6) Secure Your Email (A Major Infection Vector)
- Train users to identify phishing
- Block risky attachment types where possible
- Use MFA on email accounts
- Implement DMARC/DKIM/SPF (business domains)
7) Monitor and Respond
For businesses, monitoring is key:
- log DNS queries and outbound connections
- alert on unusual spikes in egress traffic
- review authentication logs for anomalies
For home users:
- check router admin logs if available
- watch for unexplained device behaviour
- consider a router with built-in security features
What to Do If You Suspect a Botnet Infection
For Individuals / Small Offices
1. Disconnect the device from the network (Wi-Fi off / unplug Ethernet).
2. Run a full malware scanusing reputable security software.
3. Updatethe OS, browser, and all applications.
4. Change passwords, starting with email and banking, and enable MFA.
5. If it’s a router/IoT device:
- factory reset (only if you know how to re-secure it),
- update firmware,
- change admin password,
- disable UPnP,
- review DNS settings and port forwarding.
For Businesses
1. Isolate impacted endpoints (network quarantine).
2. Investigate (EDR telemetry, DNS logs, proxy logs, firewall egress).
3. indicators Block C2 (domains/IPs) across network controls.
4. Reset credentials that may be compromised; enforce MFA.
5. Hunt laterally: check for internal spread and persistence mechanisms.
5. Document and consider reporting where appropriate (industry/regulatory context).
Botnets vs. Other Threats: Quick Clarity
- Botnet: a network of compromised devices under remote control
- Virus/Worm: malware types; may be used to build a botnet
- Ransomware: extorts victims by encrypting data; botnets may deliver it
- DDoS tool: one use-case; botnets can do much more
Think of “botnet” as the infrastructure attackers build, and other malware types as tools they deploy through that infrastructure.
It takes only a few minutes for devices to become infected. Unfortunately, till IoT manufacturers can plug in vulnerabilities, and create a more robust security environment, remaining vigilant is necessary. It is essential that all your devices are protected all the time with a comprehensive security cover. Speak to our cybersecurity experts for a complete security solution. Contact us or email us at cybersecurity@computingaustralia.group.
Jargon Buster
FAQ
What is a botnet in simple terms?
A botnet is a group of internet-connected devices that have been infected with malware and are controlled remotely by a criminal. Each infected device becomes a “bot” that can be used for attacks-often without the owner noticing.
How do botnets infect devices?
Botnets commonly spread through phishing emails, malicious downloads, fake software updates, and exploiting unpatched vulnerabilities. IoT devices are often infected through default passwords, exposed admin panels, or outdated firmware.
Can my device be part of a botnet without me knowing?
Yes. Many bot infections use minimal bandwidth and run quietly in the background. With IoT devices (like cameras and routers), infections can be especially hard to spot because there’s little visible performance impact.
What are botnets used for?
Botnets are used for DDoS attacks, sending spam and phishing emails, stealing credentials, ad fraud (fake clicks/traffic), distributing malware (including ransomware), and sometimes crypto-mining.
How can I tell if my router or IoT device is infected?
Warning signs include unusual internet traffic spikes, changed DNS settings, unknown admin accounts, random reboots, sluggish network performance, or remote access being enabled without you turning it on.