Botnets: What They Are, and How They Threaten Your Computer
CREDIT: Gunnar Assmy/Shutterstock.com
Once a computer is infected with botnet malware, it becomes a "zombie" under the control of a "bot herder," who uses a command-and-control server to remotely operate the machines and harness their computing power for his own purposes.
The bot herder makes the infected computers perform various automated tasks, such as sending out huge amounts of spam emails or distributing more malware. A botnet using well-written code can put a large number of computers, from a few hundred to tens of thousands, under the bot herder's control, and could threaten other computers connected to the same network.
Web criminals and syndicates often distribute botnet malware on the Internet, usually via "drive-by downloads" that infect users visiting insecure websites, or with emailed "Trojans" that pretend to be innocuous software, but in fact are malware.
Botnet malware often installs modules that configure the infected computer according to the bot herder's specifications. Very sophisticated botnet malware can be hard to detect, even with the latest anti-virus scanners, if it has gotten into the system unnoticed.
Trojans may delete themselves after they've completely performed their tasks, or reprogram themselves to look innocent, making it more difficult for anti-virus programs to find them. Computer owners are often unaware of the attacks.
However, if your computer is infected, significant changes in its performance may be noticeable, because the machine will slow down while the botnet's tasks are running in the background.
In order for computer owners to protect their home networks from botnet attacks, Internet usage precautions should be practiced:
— Install anti-virus software from a trusted vendor to block and quarantine suspicious code. If you're on a PC, it's worth paying for full-featured anti-virus software that automatically scans websites for malware. Mac malware has been increasing, so you'll want to explore those options as well.
— Turn on your computer's firewall. All modern operating systems offer this option.
— Don't download files from unknown sources, and use your anti-virus software to scan all downloads and email attachments, no matter what their source.
— Create a separate "administrator" account on your machine that alone has the ability to install software. Use a regular account with limited privileges to do your day-to-day tasks; that way any malware you encounter on the Web or through email will have a much harder time installing itself.
— When you're not using the machine, shut it down or put it to sleep. Botnet herders depend on machines that are active 24 hours a day.
If you think that your computer has been infected by botnet malware, try backing up all your important files, then reformatting the drive and reinstalling all the programs to give your computer a clean start. (Make sure you have all the software installation disks handy.)
And, to repeat: Installing good anti-virus software and turning on your firewall will go a long way toward keeping your network and computer healthy from suspicious programs.