Glossary

Learn about product and technical terms, and get their definitions in our Glossary.

Table of Contents

Botnet

A botnet is a network of compromised computers or devices controlled by a malicious actor, often used for malicious activities such as Distributed Denial of Service (DDoS) attacks, spam distribution, and data theft. Botnets can consist of thousands or even millions of infected devices, making them a powerful tool for cybercriminals.

What is a Botnet?

A botnet is a network of compromised computers or devices that are controlled by a malicious actor, often referred to as a "botmaster" or "bot herder." These compromised devices, known as "bots" or "zombies," can be used to perform various malicious activities without the knowledge of their owners. Botnets can consist of thousands or even millions of infected devices, making them a powerful tool for cybercriminals.

How Botnets Work

Botnets typically operate by infecting devices with malware, which allows the botmaster to remotely control the compromised devices. The malware can be spread through various means, including phishing emails, malicious downloads, and vulnerabilities in software. Once a device is infected, it becomes part of the botnet and can be used to carry out various tasks as directed by the botmaster.

Common Uses of Botnets

  • Distributed Denial of Service (DDoS) Attacks: Botnets can be used to overwhelm a target server or network with a flood of traffic, rendering it unavailable to legitimate users.
  • Spam Distribution: Botnets can send large volumes of spam emails, often used for phishing attacks or to promote malicious products and services.
  • Data Theft: Botnets can be used to steal sensitive information, such as login credentials, credit card numbers, and personal data from infected devices.
  • Cryptocurrency Mining: Some botnets are used to mine cryptocurrencies using the processing power of infected devices, often without the owners' consent.
  • Click Fraud: Botnets can generate fake clicks on advertisements, leading to financial losses for advertisers and skewing analytics data.
  • Credential Stuffing: Botnets can automate the process of testing stolen usernames and passwords against various online services to gain unauthorized access to accounts.
  • Spreading Malware: Botnets can be used to distribute additional malware to other devices, further expanding the botnet and increasing its capabilities.

Related Terms

Ready to ditch Google reCAPTCHA?
Start for free today. No credit card required.