Zombie Computer
What is a zombie computer?
A zombie computer is the result of a cyber-attack similar to a traditional Trojan horse attack (a malicious code wrapped inside a regular behaving code). But instead of aiming only to install a keylogger and steal your personal data, the malicious software will transform your computer into a zombie: thanks to this infection, the hackers can control it remotely. Very often, they will make it “work” with other zombies. Together, all these infected computers will form a botnet (or a zombie army).
Botnets
The term botnet is a portmanteau word made with the terms ‘robot‘ and ‘network’. Botnets are entire networks of computers controlled and instructed to do many kinds of hostile things, such as:
- Attack other computers (DDoS attacks, for example)
- Send spam or phishing emails
- Infect other computers or IT systems with malware (ransomware, spyware, …)
- Commit advertising frauds
- Other similar malicious acts…
The worst part is that it all can happen without you having the slightest idea about it.
How can my computer turn into a zombie?
It only takes malware to turn your computer into a zombie. Malware is a virus or malicious software insidiously installed on your computer. Once your computer is infected, this program runs to perform unwanted actions that are often harmful to you.
Hackers have several options for infecting a computer with malware. They can use a loophole in software or firmware that has not been updated to introduce it into an organization’s computer system or an individual’s computer or embed it in a misleading email. All it takes is a browser plugin update you just keep postponing or a click on a link in an email that seemed to come from a trusted institution.
The bad news is that smart cybercriminals are now using encryption to bypass the conventional virus scanning and spamming checks – making malware (almost) undetectable.
Comments
Post a Comment