![]() ![]() ![]() You can also refer to other cleanup tools on "Security Tools" page (click here). The following instructions are applicable to the cleanup of typical botnet infection on Windows PC. How botnet works (image created by Tom-b: ) The combined resources of these controlled devices can be used to launch destructive or sophisticated attacks like sending billions of spam email, huge bandwidth DDoS and targeted financial fraud. A botnet typically consists of hundreds or even millions of devices, including PC, Mac, Linux servers, home router, smartphone etc. Once a device is installed with a "bot software" via malware infection, “bot herder” can make the bot do anything by issuing commands via a command and control (C&C or C2) server. Literally, “Bot” is short for “robot”, and adding the “net” to it creates “botnet” which means “a network of bots” and the hacker who controls other people's computers is called "bot herder". HKCERT has been closely monitoring the development of botnets, taking different follow-up actions in response to attacks, and issuing timely security recommendations to users to fix vulnerabilities and raise awareness. Hackers can remote control them to participate in illegal activities, launching sophisticated and destructive attacks, which result in wider information leakages and severe service disruptions, causing massive losses. Smart devices such as computers, mobile phones, and IP cameras run the risk of being infected and becoming part of a botnet. Botnet is one of the major security threats nowadays.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |