What is Botnet?
A network of compromised devices controlled by an attacker, used for DDoS attacks, spam, cryptocurrency mining, or distributed credential stuffing.
Botnets turn everyday devices into an army controlled by a single attacker.
How Devices Get Recruited
- Malware infections through phishing or drive-by downloads
- Exploiting default passwords on IoT devices
- Software vulnerabilities that allow remote code execution
Famous Botnets
- Mirai: 600K+ IoT devices, took down major internet infrastructure
- Emotet: Banking trojan turned botnet-as-a-service
- Storm: One of the first major botnets (2007)
Protection
- Keep all devices updated
- Change default passwords on IoT devices
- Use a firewall to block unauthorized outgoing connections
- Monitor network traffic for unusual patterns
Related Terms
Internet of Things Security
The security challenges posed by billions of internet-connected devices that often have minimal security, no update mechanism, and extensive data collection capabilities.
Malware
Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Malware includes viruses, ransomware, spyware, trojans, and worms—each with different infection methods and objectives.
Ransomware
Malware that encrypts a victim's files and demands payment (usually cryptocurrency) for the decryption key. Modern ransomware also threatens to publish stolen data if ransom isn't paid (double extortion).
Have more questions?
Use our guided flow to get the right next privacy step for Botnet.
Open Guided Flow