Ready to Start Your Career?

By: lpark
July 24, 2019
Botnet Structures and Attacks

By: lpark
July 24, 2019
Botnets are a powerful tool for hackers and cybersecurity professionals. Composed of many connected and “infected” devices, botnets are used to carry out user actions on a grand scale. This article explores popular examples of botnets, their structures, and the types of attacks that utilize botnets.Botnets are a popular, alluring option for hackers and cybersecurity professionals across the globe. Vast personal armies of digital “zombies”, or bots, can be directed towards mass action on a dizzying scale. It’s no surprise that this sort of digital necromancy is popular among hackers, businesses, and cybersecurity enthusiasts. A botnet can amplify a single user action to the scale of thousands. In order to understand botnets, we must outline their anatomy and history. This section will explore some popular examples of botnets, their varied structures, and the types of attacks that utilize botnets.Khan Smith was the first to achieve botnet notoriety for his spammer based on EarthLink, a web service for email and online hosting. In 2000, the EarthLink spammer sent millions of unsolicited phishing emails to unsuspecting addresses. The botnet managed to generate roughly $3 million in revenue before the hacker got hit with a $25 million dollar fine for fraud and racketeering. In 2007, the Storm botnet was created and rented out to hackers for a variety of malicious activities including identity theft and Distributed Denial of Service (DDoS) attacks. This was the first botnet to rely on peer-to-peer technology, and it had infected roughly one million computers at the height of its activity. More recently, the Mirai botnet was ousted as the cause of a major internet outage on the Eastern coast of the United States in 2016. Amusingly enough, the botnet was originally formed by university students trying to gain an advantage in online video gaming. In the public sphere, politicians and media figures have been exposed for hiring private botnet services to gain followers on social media and influence public discourse.