Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha

What is a botnet and how bad are they?

Written by  Aug 06, 2019

Botnets have become one of the biggest threats to security systems today. They are also becoming a larger part of cultural discussions around cyber security.

The use of botnets to mine cryptocurrencies like Bitcoin is a growing business for cyber criminals. It’s predicted the trend will continue, resulting in more computers infected with mining software and more digital wallets stolen. Botnets are also dangerous to businesses and consumers because they’re used to deploy malware, initiate attacks on websites, steal personal information, and defraud advertisers.

A botnet is a network of computers that have been intentionally infected with malware by cybercriminals in order to perform automated tasks on the internet without the permission (or often the knowledge) of the devices’ owners. The term is an abbreviation of ‘robot and network’. When a bot penetrates a computer, its controller can take over the control of the device and others in the botnet through communications channels using standards-based network protocols.

Cybercriminals use botnets to distribute spam email messages, spread viruses – including spyware, commit fraud and identity theft, attack computers and servers, and perpetrate DDoS (distributed denial of service) attacks.

cyber NumbersAlso see: What is ethical hacking exactly?

How your computers can become part of a botnet

Computers can become part of a botnet in the same ways as they are infected by any malware:

  • By opening attachments in emails which contain malware by means of a Trojan horse program. In this case, the Trojan may either delete itself once the computer is infected, or remain to update and maintain the malware modules.
  • By visiting websites which are infected with malware. This could happen by either clicking on malicious links in emails or social networking posts, or simply visiting infected sites proactively.
  • Peer-to-peer (P2P) – in other words spreading from one computer to another via a network, infected storage devices or on the internet.

How they manifest

To build a botnet, botmasters need as many infected online devices or “bots” under their command as possible. The more bots connected, the bigger the botnet. The bigger the botnet, the bigger the impact. So size matters. The criminal’s ultimate goal is often financial gain, malware propagation, or just general disruption of the internet.

Imagine the following: You’ve enlisted ten of your friends to call the Department of Transport at the same time on the same day. Aside from the deafening sounds of ringing phones and the employees running around, not much else would happen. Now, imagine you wrangled 100 of your friends, to do the same thing. The simultaneous influx of such a large number of signals, pings, and requests would overload the DOT’s phone system, more than likely shutting it down completely.

Cybercriminals use botnets to create a similar disruption on the internet. They command their infected bot army to overload a website to the point that it stops functioning and/or access is denied. Such an attack is called a denial of service or DDoS.

White hat hackerAlso see: What are White hat hackers?

How to protect your organisation

  • Update your operating system. Software developers actively combat malware; they know early on when threats arise. Set your OS to update automatically and make sure you’re running the latest version.
  • Uninstall one antivirus program before you install another.
  • Do not click on links in emails or social networking posts from an unknown, suspicious or untrustworthy source.
  • Avoid email attachments from suspicious or unknown sources. Email attachments are a favourite source of infection for many types of viruses. Don’t open an attachment from an unknown source.
  • Take care when using USB connected devices (eg memory sticks, external hard drives, MP3 players) as they are very common carriers of malware
  • Take care when using CDs/DVDs as they can also contain viruses.
  • When downloading free software, do so with extreme caution.
  • Avoid downloads from P2P and file sharing networks. Botnets use P2P networks and file sharing services to infect computers. Scan any downloads before executing the files or find safer alternatives for transferring files.
  • Buy only reputable software from reputable companies and ensure that it is always kept updated.

Bitcoin Exchange CEX.IO

Sam Collins

Sam is the most experienced member of the team having worked for 19 years in the tech industry and now tech journalism. He is full of passion for all things tech and this comes across in his work.

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.


Popular News

Jun 13, 2020 IT Security News

Microsoft announces major issue in Windows 10 June 2020 updates

On 9th June, 2020, Microsoft released cumulative updates for supported versions of Windows 10 including version 2004, ve...

Jun 12, 2020 Cyber Security

NHS email service fooled users in phishing attack

NHS Digital is contacting users of its NHSmail email system after a small number of mailboxes were compromised in a gene...

May 25, 2020 Cyber Security

Beware of security threats before deploying remote working

Remote working is receiving a great deal of attention recently for obvious reasons. The world has changed and remote wor...

Jun 09, 2020 Cyber Threats

Common types of cyber-attacks and how to avoid them

With cyber-attacks on the rise, businesses are constantly worried about losing vital data and the threat is very real. ...

May 19, 2020 IT Security News

EasyJet data breach: Over 9 million customers affected

The personal data of over 9 million EasyJet customers has been infiltrated by hackers, including over 2,000 users' credi...

May 18, 2020 Cyber Security

UK power grid operator Elexon hit by cyberattack

The UK’s power grid middleman Elexon has announced it has fallen victim to a cyberattack, which did not compromise pow...

Jun 12, 2020 IT Security News

100,000 cheap wireless cameras sold in the UK are vulnerable to hacking

Consumer advocacy organisation Which? has issued a warning over the security of wireless camera brands made by China-bas...

May 28, 2020 IT Security News

UK virus apps highlights tension between privacy and need for data

As more UK and European governments turn to tracing apps in the fight against the coronavirus, a deep-rooted tension bet...

Jun 09, 2020 IT Security News

Self-employed targeted by hackers with HMRC SMS phishing scam

Cyber criminals have launched a new phishing scam designed to steal personal and financial details of millions of self-e...

May 27, 2020 Cyber Security

UK scared cybercriminals will use NHSX Covid-19 Tracing App to launch attacks

Nearly half (48%) of the UK public surveyed about the NHSX COVID-19 tracing app do not trust the UK government to keep t...

Jun 08, 2020 Cyber Security

Ransomware attack compensation: What the UK public think

UK consumers believes businesses should stand their ground having suffered a ransomware attack and refuse to negotiate w...

May 28, 2020 IT Security News

Defence tips to stop a trojan invasion

Knowing not to open email attachments from unfamiliar addresses, or even the email itself, is a vital step to preventing...

May 20, 2020 IT Security News

To VPN or not to VPN for business users

It’s a question many organisations are asking as they work to provide secure and reliable remote access at scale. ...

Jun 11, 2020 IT Security News

UK government still can’t decide how NHS contact tracing app should work

A new report today says that the UK government still hasn’t decided exactly how its NHS contact tracing app should wor...

May 22, 2020 Cloud Security News

Overwhelming majority of UK organisations now confident in public cloud security

UK businesses are extremely confident in the security measures offered by public cloud service providers.

Jun 25, 2020 IT Security News

NCSC catch a million phish

The National Cyber Security Centre has received the millionth submission to its Suspicious Email Reporting Service. ...

Symantec Home 120x60