WHAT IS BOTNET ATTACK?
The number of cyber-attacks has grown dramatically in recent
years. Hackers are targeting governments, businesses, and
individuals around the world, and you may have unwittingly
assisted them in carrying out their attacks. If you have ever clicked
on a link in a suspicious email and similar emails have been
automatically sent to all your contacts, you have surely been a
victim, and an accomplice of a botnet.
It is a word made up of the words "robot" and "network". A botnet
is a group of computers remotely controlled and coordinated to
carry out harmful tasks. A single botnet can be made up of between
several hundred and several million computers, they are called
“bots” (the word “robots” shortened).
Botnets can access your computer through the installation of
malicious programs, a direct attack by a hacker, or an automated
program that scans the internet for security deficiencies (for
example, lack of virus protection) that can be exploited. . If your
computer, or any other device connected to the internet, is infected
by malware, it could become one of the “bots” that make up a
botnet. If this is the case, the other computers and devices on your
network are also at risk of becoming part of the same botnet.
All computers in a botnet are remotely controlled, either by a
hacker or by command and control software, developed by him.
Also known as "zombie army," these computers can be used by
botnet owners to send spam, shut down web pages, generate
revenue from bogus internet traffic, or advertise paid downloads of
rogue software to kill botnets.
As with many other technologies, botnets were not created to carry
out harmful actions. In the early days of the worldwide extension
network, its main use was to host IRC networks. However, it didn't
take long for hackers to identify the main weaknesses of the
primary botnets and to start exploiting those weaknesses for their
Today, botnets are the biggest threat to cyber security, they