scorecard
  1. Home
  2. tech
  3. BOTNETS: How Hackers Can Control Your Computer Remotely For Mayhem And Profit

BOTNETS: How Hackers Can Control Your Computer Remotely For Mayhem And Profit

One of the most widely-used botnets is called Zeus.

BOTNETS: How Hackers Can Control Your Computer Remotely For Mayhem And Profit

You can customize your own build using free software.

You can customize your own build using free software.

Using readily-available software that's nothing more than a search away, people who mean you harm can get a customized Zeus botnet up and running in minutes. At this point, they distribute it, most likely via email.

They'll employ a little bit of human engineering to get you to install a program that connects back to a server that they control. At this point, they are able to send commands to your computer.

There are a few communities online where people trade botnet tricks and tips.

There are a few communities online where people trade botnet tricks and tips.

The Botting Network is one of the largest of these. People who run their own botnets (whether for legitimate or illegitimate purposes) will come together to trade tips and thoughts on maintaining a botnet.

You can rent (or even buy) botnets from people in these communities.

You can rent (or even buy) botnets from people in these communities.

You can get your own botnet off to a start by buying 100 infected computers for somewhere in the neighborhood of $10.

Once you've got a big botnet, you can put it to work making money for you.

Once you

There are a number of ways to put a botnet to work to reap financial reward. You can get infected computers working together to mine bitcoins at an incredible rate. If you get referral kickback from certain websites, you can have the botnet access those sites through your referral link. If you get income from people clicking on Google AdSense or other banner ads, you can have these computers click on them for you.

Because each of these computers has its own IP address and can be easily distributed across a huge distance, it becomes incredibly difficult to detect.

You could use it to take down a website.

You could use it to take down a website.

By getting each infected computer to repeatedly access a website, a botnet can take that site out of commission in what is called a "denial of service" attack. Basically it clogs the internet traffic to that site so severely that no one can get through.

You could use it to send spam emails.

You could use it to send spam emails.

Spam, the scourge of email, often comes from botnets. By distributing the workload of sending so many emails between a number of computers, it becomes a trivial effort to send hundreds of thousands of messages.

You can keylog and steal people's data.

You can keylog and steal people

If you want to get even more nefarious, you can capture and record people's keystrokes on their computers. This gets you access to all kinds of sensitive data – passwords, bank account numbers, private communications, and the like.

You can manipulate online polling results.

You can manipulate online polling results.

If you're especially invested in the outcome of an internet poll, your botnet can go in and vote en masse for your desired outcome. This is especially useful for contests or polls with any real-world outcome.

How do you protect yourself?

How do you protect yourself?

There are a number of free and paid tools you can use to make sure your computer stays strictly under your control. We like Microsoft Safety Scanner and BotHunter.

Just download and install them to keep yourself protected.


Popular Right Now




Advertisement