Advertisment

Tips to defend Botnet malware: ESET

ESET, alerts on a costly security threat Botnet malware. Operation Windigo, Stuxnet, Conficker and Flashback are just a few of the most well-known botnets.

author-image
Sanghamitra Kar
Updated On
New Update
ID

BANGALORE, INDIA: ESET alerts on a costly security threat from Botnet malware. Operation Windigo, Stuxnet, Conficker and Flashback - these are just a few of the most well-known botnet malware.

Advertisment

The word botnet is made up of two words: bot and net. Bot is short for robot, which runs automatically, net comes from network, a group of systems that are linked together. A botnet is a network of infected computers, where the network is used by the malware to spread.

Use of Botnets:

Botnets are used by malicious actors for various purposes, ranging from information theft to sending spam. Various types of people operate botnets like criminals use them to steal banking credentials and commit fraud, pranksters use them to spy on webcams and extort their victims.

Advertisment

How to find out:

The size of the attack is much larger than the 700 domains and nearly 10,000 users have hit these domains and been exposed to the malicious advertisements. This attack finds a victim to run malvertizing campaign. The attack is extremely effective and delivers a unique malicious payload for every visitor, packaged with a legitimate media player, and a piece of malware which is tailored to each user. Malicious software is created for all major operating systems. Regrouping infected devices into networks, or botnets, is feasible for every platform.

Risks for home users and businesses:

Advertisment
  • The risks associated with botnets are exactly the same as the risks associated with malicious software in general.
  • One can have sensitive information stolen from the electronic device, such as intellectual property, blueprints, or passwords giving access to sensitive resources (for example online games).
  • Infected computers can also be used to overload servers or send spam.
  • It is important to know that once a computer is infected, it really doesn't belong to its owner anymore; it is operated and used by someone who can be on the other end side of the globe, potentially conducting all kinds of illegal activities.
  • The line between corporate and personal devices and networks is very blurry. We all bring personal devices to work and vice-versa, botnets are threat to both types of users.

Effective approach to fighting botnets

  • We can spot infections in network traffic, in the memory of infected computers or on their hard drive.
  • On the other hand, the most effective approach to fighting botnets is education, by raising the awareness around this threat.
  • Everyone should realize that if their computer is infected, it might be used to harm others. Thus, whenever an infected computer is found, it needs to be taken offline and cleaned as quickly as possible.
  • Finally, collaboration between users, research groups, internet service providers and law enforcement agencies greatly helps in fighting botnets and bringing the people who operate them to justice.
  • Strict security and monitoring; identifying and stopping botnet attacks should be easier in Business networks. On the other hand, there is more sensitive data to be stolen from corporate networks.
tech-news security