Zombie Computers, Botnets, and Denial of Service Attacks | Cybersecurity Insights #16

June 12, 2019 posted by

Hey everyone, it's Josh from Absolute. We've been talking a lot about
cyber threats and in today's episode, we'll look at one of these shadowy characters: Botnets The term botnet is a mash-together
term that comes from robot and network. A botnet is an array of
hacked computers connected together so they can team up to perform cyber-attacks. And typically the user is totally unaware that their device has been compromised
and joined some rebel army; this is one of the reasons that
computers inside the botnet are called "Zombie Computers". These zombies are controlled
by a number of protocols, including: Telnet, IRC Peer-to-Peer (P2P), and domain controls These control systems allow the cyber criminal to link hacked machines together
for a powerful and coordinated attack. So what do they do, these botnets? Well, the most common form of botnet attack is the denial of service, which can also be widespread, hitting many of your resources at once. When this happens
it's called a distributed denial of service attack or DDoS. When the botnet zombie
computers send millions of requests to something like a web server, the web server can crash… blocking legitimate access. And beyond denial of service attacks, Botnets have been observed launching spyware email spamming click-fraud, and GPU mining; which is enslaving millions of
computers to churn out cryptocurrency. In 2018, 37% of botnet zombie computers were inside the United States. That's right! Although most botnets
are controlled outside of the U.S., close to half of the
machines are working inside the USA. We just don't know it, because most of the time
we lack visibility to every device especially those that are off the corporate network. The largest botnet of all time (so far) was called BredoLab, also known as Oficla. It had more than 30 million zombies doing its bidding. Thankfully though,
BredoLab was dismantled in 2010. Botnet attacks are dangerous
because they don't come with a return address; You can't know for sure
who's doing it or when it'll happen. But even if we can't predict botnet attacks we can reduce their odds of success, by having ceaseless endpoint visibility and control. don't forget to like and comment below. Then subscribe, to get more Cybersecurity Insights. I'll see you next time.

No Comments

Leave a Comment

Your email address will not be published. Required fields are marked *