23.05.2018
Ask Semalt Why Cybercriminals Use Bots
Oliver King, the Semalt Customer Success Manager, explains that cybercriminals use "bots" to control malwareinfected computers or devices. For this to be possible, they have to be part of a network for the attacker to co-opt them this way.
Creating a botnet There are a lot of ways through which attackers can plant bot programs. By the way, machines already infected with malware are called "bots" or "zombies." The most common way to make user's computers get infected is when you are browsing a potentially harmful website. Being on the site, the "bot" programs assess its vulnerabilities and take advantage of it. If it successfully gains entry into the computer, a bot then installs itself. Another way is when an attacker sends a le attachment or spam email to the targeted user. Also, the existence of a single malware on the computer may give way to others, which "bot" programs can also use to gain access. Once the "bot" malware establishes itself in the system, it makes attempts to connect to the source website or server to receive instructions on what to do next. The server sends commands and monitors what goes on with the botnet, which is why it is called the command-and-control (C&C) server. The attacker will use the server to create a client program and then send information to the "bot" to conduct a range of tasks through the network it currently operates on. It is possible to issue commands to one or all of the bots in the network. The one in control is a botherder, an operator, or controller.
https://rankexperience.com/articles/article1644.html
1/2