Botnets are a major source of malware, ransomware, spam, and more. But what is a botnet? How did they form? Who controls them? How do we stop them?

It produces all sorts of images: interconnected robots, swarms of networked workers simultaneously powering a target. Interestingly, the term evokes images similar to botnets — at least in the roundabout.

Botnets command a considerable amount of computing power worldwide. And this capability is often (and probably always) the source of malware, ransomware, spam, etc. But how do botnets form? Who controls them? How do we stop them?

If you have a problem with C/C++ one item is a very enthusiastic one (● ‘◡’ ●).

What is a botnet?

The SearchSecurity botnet definition states: “A botnet is a collection of internet-connected devices, which may include PCS, servers, mobile devices, and iot devices that are infected and controlled by common types of malware. Users are often unaware that botnets have infected their systems.”

The last sentence of this definition is the key. Devices in botnets usually don’t want to be there. Devices infected with some variants of the malware are controlled by remote threat actors, also known as cybercriminals. The malware hides malicious botnet activity on the device, thus keeping the owner unaware of its role in the network. You may send spam to provide attachments for thousands of tablets — without attracting any attention.

Therefore, we commonly refer to infected botnet devices as “zombies”.

What does a botnet do?

Botnets have a variety of common functions, depending on the needs of botnet operators:

** Spam: ** Sends massive amounts of spam across the globe. For example, from January to September, the average share of spam in global E-mail traffic was 56.69 percent. After the infamous McColo hosting went offline, security research firm FireEye temporarily halted the transition from the infamous Srizbi botnet, and global spam volume dropped dramatically (in fact, global spam temporarily dropped by about 50% when it finally went offline).

** Malware: ** provides malware and spyware to vulnerable computers. Malicious elements buy and sell botnet resources to facilitate their criminal activities.

** Data: ** capture passwords and other private information. This is related to the above.

** Click fraud: ** Infected devices visit websites to generate fake Web traffic and advertising impressions.

** Bitcoin: ** Botnet controllers guide infected devices to mine Bitcoin and other cryptocurrencies, quietly generating profits.

**DDoS: ** Botnet operators direct the power of infected devices to specific targets, taking them offline in distributed denial of service attacks.