Botnet

botnetscommand and controlcommand and control serverC&Ccommand and control serverscommand-and-control servermisdirectionBotbot attackbot nets
A botnet is a number of Internet-connected devices, each of which is running one or more bots.wikipedia
326 Related Articles

Gameover ZeuS

See e.g. Gameover ZeuS and ZeroAccess botnet.
Gameover ZeuS is a peer-to-peer botnet based on components from the earlier ZeuS trojan.

Srizbi botnet

Srizbi
Many large botnets tend to use domains rather than IRC in their construction (see Rustock botnet and Srizbi botnet).
Srizbi BotNet, considered one of the world's largest botnets, and responsible for sending out more than half of all the spam being sent by all the major botnets combined.

Rustock botnet

Rustok
Many large botnets tend to use domains rather than IRC in their construction (see Rustock botnet and Srizbi botnet).
The Rustock botnet was a botnet that operated from around 2006 until March 2011.

Fast flux

fast-fluxFast-flux DNS
Fast-flux DNS can be used as a way to make it difficult to track down the control servers, which may change from day to day.
Fast flux is a DNS technique used by botnets to hide phishing and malware delivery sites behind an ever-changing network of compromised hosts acting as proxies.

Zombie (computing)

zombie computerzombiezombies
In computer science, a zombie computer is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or another under remote direction.
Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks (DOS attacks).

ZeroAccess botnet

ZeroAccess
See e.g. Gameover ZeuS and ZeroAccess botnet.
It is used to download other malware on an infected machine from a botnet while remaining hidden using rootkit techniques.

Denial-of-service attack

denial of servicedistributed denial of serviceDDoS
Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection.
Usually powered by a botnet, the traffic produced by a consumer stresser can range anywhere from 5-50 Gbit/s, which can, in most cases, deny the average home user internet access.

Email spam

spame-mail spamspam email
E-mail spam are e-mail messages disguised as messages from people, but are either advertising, annoying, or malicious.
Criminal prosecution of spammers under fraud or computer crime statutes is also common, particularly if they illegally accessed other computers to create botnets, or the emails were phishing or other forms of criminal fraud.

Domain generation algorithm

bulk web domain generationDGA
Control servers may also hop from DNS domain to DNS domain, with domain generation algorithms being used to create new DNS names for controller servers.
Domain generation algorithms (DGA) are algorithms seen in various families of malware that are used to periodically generate a large number of domain names that can be used as rendezvous points with their command and control servers.

Storm botnet

Storm
The Storm botnet or Storm worm botnet (also known as Dorf botnet and Ecard malware ) is a remotely controlled network of "zombie" computers (or "botnet") that have been linked by the Storm Worm, a Trojan horse spread through e-mail spam.

Low Orbit Ion Cannon

LOIC
In some cases, a botnet may be temporarily created by volunteer hacktivists, such as with implementations of the Low Orbit Ion Cannon as used by 4chan members during Project Chanology in 2010.
People have used LOIC to join voluntary botnets.

Torpig

Torpig, also known as Anserin or Sinowal is a type of botnet spread through systems compromised by the Mebroot rootkit by a variety of trojan horses for the purpose of collecting sensitive personal and corporate data such as bank account and credit card information.

Project Chanology

leaked video interview of him promoting ScientologyOver 9000 Anonymous MarchScientology protesters
In some cases, a botnet may be temporarily created by volunteer hacktivists, such as with implementations of the Low Orbit Ion Cannon as used by 4chan members during Project Chanology in 2010.
Speaking with SCMagazineUS.com, a security strategist for Top Layer Networks, Ken Pappas said that he thought that botnets were involved in the Anonymous operation: "There are circles out there where you could take ownership of the bot machines that are already owned and launch a simultaneous attack against [something] like the church from 50,000 PCs, all at the same time".

Antivirus software

antivirusanti-virusanti-virus software
Host-based techniques use heuristics to identify bot behavior that has bypassed conventional anti-virus software.
Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT) and botnet DDoS attacks.

Internet bot

botbotsinternet bots
A botnet is a number of Internet-connected devices, each of which is running one or more bots.
A malicious use of bots is the coordination and operation of an automated attack on networked computers, such as a denial-of-service attack by a botnet.

Conficker

It uses flaws in Windows OS software and dictionary attacks on administrator passwords to propagate while forming a botnet, and has been unusually difficult to counter because of its combined use of many advanced malware techniques.

Cutwail botnet

Cutwail
The Cutwail botnet, founded around 2007, is a botnet mostly involved in sending spam e-mails.

Mariposa botnet

2009-Dec
The Mariposa botnet, discovered December 2008, is a botnet mainly involved in cyberscamming and denial-of-service attacks.

Bot herder

bot masterbotnet herder
A botnet's originator (known as a "bot herder" or "bot master") controls the botnet remotely.
The infected machine then has become one of many zombies in a botnet and responds to commands given by the bot herder, usually via an Internet Relay Chat channel.

Norton AntiBot

AntiBot
Norton AntiBot was aimed at consumers, but most target enterprises and/or ISPs.
Ed Kim, director of product management at Symantec, highlighted the rise of botnets.

Bredolab botnet

November 2010 (not complete)
The Bredolab botnet, also known by its alias Oficla, was a Russian botnet mostly involved in viral e-mail spam.

Mega-D botnet

Mega-D
For example, Mega-D features a slightly modified SMTP implementation for testing spam capability.
The Mega-D, also known by its alias of Ozdok, is a botnet that at its peak was responsible for sending 32% of spam worldwide.

Waledac botnet

2010 (March)Waledac
Waledac, also known by its aliases Waled and Waledpak, was a botnet mostly involved in e-mail spam and malware.

Lethic botnet

Lethic
The Lethic Botnet (initially discovered around 2008) is a botnet consisting of an estimated 210 000 - 310 000 individual machines which are mainly involved in pharmaceutical and replica spam.

Grum botnet

Grum
The Grum botnet, also known by its alias Tedroo and Reddyb, was a botnet mostly involved in sending pharmaceutical spam e-mails.