123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

How Botnet Infect Computers And Control Them Remotely?

By Author: Rahul Satish
Total Articles: 26

A botnet is a network of infected computers with malwares. Most of the internet users do not even realize that their computers are attacked by botnet. Botnet can do different types of attacks using your IP address and at the same time your PC becomes a remote control robot for illegal activities. Botnet generally connect through bots, an infected network which takes the control of the entire system remotely. This robot can give information to other spams also. A botnet attacker gets control of your computer in many ways through virus or worms. Botnets are powerful because the hackers control thousands and sometimes lakhs of computers remotely to perform some illegal activities online. Hackers use botnets to make a machine unavailable to its users temporarily while others use them as a spam.

Types of Botnets

The attacks of Botnets has become major problem globally and they are spreading very vast through all systems. Botnet can be done in two ways in which one is direct method and other is indirect method. Direct method means botnet establishes a connection directly to the computers which are infected by cyber criminals and manages it by using bot program. The other way is indirect method in which the control center is connected by a bot and sends a request or spam to the user & then performs the returned command. Botnets can be centralized in which computers are connected in a single direction to the control center whereas the other is decentralized where there is a bot to bot connection.

Bot Master or Botnet Herder

'Bot master' also called as 'Botnet Herder' is an individual server that keeps several PCs under control by installing a malicious software. Botnet servers also communicates with other botnet servers which are under the control of bot master and maintains the network. These herds of bot machines behave as zombies working for the bot masters, attacking or infecting the computers through a network. Once the PC is infected, the system acts weirdly, suddenly it shuts down, strange emails appear in your mailbox, files may get corrupted or you may get unknown error message.


The infected machines forms a network called as 'zombies'.A bot uses a zombie network that downloads another malicious programs to steal the passwords & are sold out for infecting web pages to enlarge zombie network. Zombie army also referred as malware botnet. It is under the control of remote that directs it. Zombies spread through email spam and run secretly in the background generating fake clicks.

Spamming through Botnet

Instead of targeting the criminal activity directly, some Botnet owners give it on rent to the spammers, which allows them to to send thousands of messages from infected machines within a short period of time. Most of the mail servers blacklist or block the spam automatically whereas spammers overcome this problem by sending more and more emails to the unknown users. It not only attacks the computers but will collect the email address information from computers which are infected. Botnet will add more and more new email addresses and spreads across faster from one system to another. Sometimes botnet also attack the servers making them unavailable by sending false requests from the bot infected PCs.

Distributed denial of service attack

A malware infected computer is more vulnerable to become a part of DDos attack. It is called as distributed denial of service. At the same time it can also perform other activities like malicious actions making the network unavailable to the users. It uses a single machine which targets a software by sending requests. Through remotely controlled network of control servers, Botnet executes the DDos attack on the website servers, making the websites completely unavailable to the users.

Knowledge for success is a website focused on providing useful and supportive information that will help small and medium business owners achieve success. The topics provided are across from different categories such as business planning, recruitment, technology, self development etc. For more details on the categories, please visit knowledge-4-success.com.

Total Views: 117Word Count: 663See All articles From Author

Computers Articles

1. Troubleshooting Common Blue Screen Error Messages On Dell Computer.
Author: Dataalign

2. Easy Workaround To Share An Hp Printer Between Different Computers
Author: Tony Roy

3. Kodi Open To Malware Attacks
Author: bella watson

4. How To Resolve The Facebook Common Problem
Author: rock rozer

5. How To Install Microsoft Office Visio?
Author: Maria Williams

6. Fetch The Crucial Details About Scada For Eventual Results
Author: James Finch

7. Collect Plausible Information On Scada Now
Author: James Finch

8. Linksys Ac1900 Wifi Range Extender Is The Easiest Solution
Author: linksyssupportus

9. Cisco Patches Up Critical Bug Which Made Networks Vulnerable To Attackers
Author: Aida Martin

10. Tally Software Solution - Tally Erp 9 Backup File Format
Author: Al Manal Technology

11. Dell Computer Does Not Boot To Microsoft Windows.
Author: Dataalign

12. How To Fix Startup Issues In Hp Laptops?
Author: Tony Roy

13. Microsoft And 33 Other Global Leading Tech Companies Join Forces To Fight Against Cybercrime
Author: Aida Martin

14. How To Fix ‘ms-office Stops Functioning While Opening Or Saving A File’ Error?
Author: Bailey Martin

15. Broke Your Iphone Screen Upon Falling? Get It Replaced With Less Expense
Author: Edward D Lemos

Login To Account
Login Email:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: