Logo

What are Botnets and How do They Work?

In October 2016, the Mirai botnet unleashed a massive DDoS (Distributed Denial of Service) attack on the US east coast. The creators, a bunch of university students, initially targeted vulnerable IoT devices to create a powerful botnet. But with the code being posted online, other criminal minds are already at work building and modifying the code for bigger and more dangerous attacks. So, what are botnets and how do they work? Our cybersecurity experts answer.

What are botnets?

A botnet is a network of internet-connected devices or bots. When these bots are infected with malicious codes, they are sometimes referred to as zombies. A botnet usually consists of hundreds of thousands of infected computers and devices that hackers control remotely. A botnet can consist of not just computers, but any device that is connected to the Internet. The Mirai botnet used unsecured IoT devices. The botnet is then used to carry out large scale malicious attacks.

How do botnets work?

Your computer can be directly hacked, or you can be tricked into clicking and downloading malicious code from emails or malicious websites. Once infected, the device delivers the message to the hacker or botnet herder. Your computer or device is now a part of the botnet. The worst part is all this happens without you being aware that your system is infected. The only indication can be a slowing down of your system.

Criminals use botnets to

How can you protect your devices from botnet attacks?

Botnet attacks-Computing Australia Group
A bot infection can be extremely hard to detect as it uses little bandwidth on an individual computer. Botnets increasingly use IoT devices as they are highly vulnerable and less secured than computers. However, the following steps can help you keep your devices secured from becoming zombies.

It takes only a few minutes for devices to become infected. Unfortunately, till IoT manufacturers can plug in vulnerabilities, and create a more robust security environment, remaining vigilant is necessary. It is essential that all your devices are protected all the time with a comprehensive security cover. Speak to our cybersecurity experts for a complete security solution. Contact us or email us at cybersecurity@computingaustralia.group.

Jargon Buster

loT – Internet of Things – a collective term to describe physical objects that connect to the Internet. IoT devices generally mean devices that usually are not expected to have an internet connection, like smart security systems, fitness trackers or smart refrigerators.

DDos attack – Distributed Denial of Service attacks are a form of cyberattack where a server is overwhelmed by more traffic than it can handle and shuts down.