Survivalist Pro
Photo by Tima Miroshnichenko Pexels Logo Photo: Tima Miroshnichenko

What do hackers use zombies for?

Zombie computers often coordinate together in a botnet controlled by the hacker, and are used for activities such as spreading e-mail spam and launching distributed denial-of-service attacks (DDoS attacks) against web servers. Most victims are unaware that their computers have become zombies.

Who will bury me if I have no family?
Who will bury me if I have no family?

But if the state discovers no family, the estate (if there is one) will revert to the state. If you die and have no money or relatives, the county...

Read More »
What is the best selling console right now 2022?
What is the best selling console right now 2022?

PlayStation 5 PlayStation 5 remains the best-selling hardware platform of 2022 in year-to-date dollar sales, while Nintendo Switch leads in units."...

Read More »

Compromised computer used for malicious tasks on a network

This article is about the term "zombie" in computer security. For "zombie" in UNIX programming, see Zombie process In computing, a zombie is a computer connected to the Internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse program and can be used to perform malicious tasks under the remote direction of the hacker. Zombie computers often coordinate together in a botnet controlled by the hacker, and are used for activities such as spreading e-mail spam and launching distributed denial-of-service attacks (DDoS attacks) against web servers. Most victims are unaware that their computers have become zombies. The concept is similar to the zombie of Haitian Voodoo folklore, which refers to a corpse resurrected by a sorcerer via magic and enslaved to the sorcerer's commands, having no free will of its own.[1] A coordinated DDoS attack by multiple botnet machines also resembles a "zombie horde attack", as depicted in fictional zombie films. (1) Spammer's web site (2) Spammer (3) Spamware (4) Infected computers (5) Virus or trojan (6) Mail servers (7) Users (8) Web traffic Zombie computers have been used extensively to send e-mail spam; as of 2005, an estimated 50–80% of all spam worldwide was sent by zombie computers.[2] This allows spammers to avoid detection and presumably reduces their bandwidth costs, since the owners of zombies pay for their own bandwidth. This spam also greatly increases the spread of Trojan horses, as Trojans are not self-replicating. They rely on the movement of e-mails or spam to grow, whereas worms can spread by other means.[3] For similar reasons, zombies are also used to commit click fraud against sites displaying pay-per-click advertising. Others can host phishing or money mule recruiting websites.

Distributed denial-of-service attacks [ edit ]

Zombies can be used to conduct distributed denial-of-service (DDoS) attacks, a term which refers to the orchestrated flooding of target websites by large numbers of computers at once. The large number of Internet users making simultaneous requests of a website's server is intended to result in crashing and the prevention of legitimate users from accessing the site.[4] A variant of this type of flooding is known as distributed degradation-of-service. Committed by "pulsing" zombies, distributed degradation-of-service is the moderated and periodical flooding of websites intended to slow down rather than crash a victim site. The effectiveness of this tactic springs from the fact that intense flooding can be quickly detected and remedied, but pulsing zombie attacks and the resulting slow-down in website access can go unnoticed for months and even years.[5] The computing facilitated by Internet of Things (IoT) has been productive for modern day usage but it has played a significant role in the increase in such web attacks. The potential of IoT enables every device to communicate efficiently but this increases the need of policy enforcement regarding the security threats. Through these devices, the most prominent attacking behaviors is the DDoS. Research has been conducted to study the impact of such attacks on IoT networks and their compensating provisions for defense.[6]

Did Germany use child soldiers in ww2?
Did Germany use child soldiers in ww2?

Towards the end of the war, the Germans established an entire SS Panzer Tank Division with the majority of its recruits being 16- and 17-year-old...

Read More »
How long will 500 gallons of water last?
How long will 500 gallons of water last?

How to Make Emergency Water Storage Last How long with the Ultimate 500 gallon Water Tank last your family? # of family members 1 gallon per day 3...

Read More »

Notable incidents of distributed denial- and degradation-of-service attacks in the past include the attack upon the SPEWS service in 2003, and the one against Blue Frog service in 2006. In 2000, several prominent Web sites (Yahoo, eBay, etc.) were clogged to a standstill by a distributed denial of service attack mounted by ‘MafiaBoy’, a Canadian teenager.

Smartphones [ edit ]

Beginning in July 2009, similar botnet capabilities have also emerged for the growing smartphone market. Examples include the July 2009 in the "wild" release of the Sexy Space text message worm, the world's first botnet capable SMS worm, which targeted the Symbian operating system in Nokia smartphones. Later that month, researcher Charlie Miller revealed a proof of concept text message worm for the iPhone at Black Hat Briefings. Also in July, United Arab Emirates consumers were targeted by the Etisalat BlackBerry spyware program. In the 2010s, the security community is divided as to the real world potential of mobile botnets. But in an August 2009 interview with The New York Times, cyber security consultant Michael Gregg summarized the issue this way: "We are about at the point with [smart]phones that we were with desktops in the '80s."[7]

See also [ edit ]

What are the poops in Mario called?
What are the poops in Mario called?

Mrcrackerpants Species Hybrid of a Goomba and Paragoomba, But You really see more Goomba, because that's more dominate. First appearance Super...

Read More »
How can I detox my liver in 2 days?
How can I detox my liver in 2 days?

For two days, I recommend the following: Sip on dandelion tea. Apple cider vinegar water. Green smoothie with parsley and cilantro (recipe below)...

Read More »
What causes you to get a FUPA?
What causes you to get a FUPA?

“Causes of FUPA include lack of exercise and obesity,” she adds. Factors like age, pregnancy, rapid weight loss, and genetic predisposition may...

Read More »
Why did G-Unit break up?
Why did G-Unit break up?

Beginning in 2005, tensions began to rise between 50 Cent and The Game, and shortly after the release of The Documentary, tensions escalated into a...

Read More »