While sometimes just an annoyance, spam can have more malicious intent – such as phishing and malware propagation. But where does all this spam come from? Zombies, of course. In order to carry out massive projects, attackers often use a botnet (a portmanteau of “robot” and “network.”)
A botnet is a group of computers that have been infected with a virus that allows an attacker to secretly control them. These computers are often called “zombies.” Botnets can be used for anything from phishing to DoS (denial-of-service) attacks and spam propagation. When the authorities try to trace the attack back to the culprit, they are led back to a zombie computer and an unknowing victim of a bot.
By exploiting weaknesses in a computer’s operating system, an attacker will send in a small program (the bot) that will turn the user’s computer into a zombie. Now that the attacker has access, your zombie computer will join the hoard and can be a part of a massive army used to carry out an attacker’s will. Antivirus experts estimate that at least 12 million computers are part of a botnet.
Note: In reality, it is very difficult to determine if your computer is part of a botnet without advanced knowledge. A sophisticated bot will hide all traces of itself on an infected computer. Attackers don’t always exploit the same weaknesses when turning computers into zombies, making detection even more difficult.
If you have questions about cybersecurity, or if you want to learn more about how to stay safe online, contact the Information Security Office (ISO) at: infosec@miami.edu
Copyright: 2024 University of Miami. All Rights Reserved.
Emergency Information
Privacy Statement & Legal Notices
Individuals with disabilities who experience any technology-based barriers accessing University websites can submit details to our online form.