Categories: EducationFAQ

What is a Botnet?

The ongoing war between malicious hackers and technology security specialists has been waging for as long as the Internet has been widely used. One tool in the arsenal is called a Botnet. A Botnet essentially is a number of devices which are connected by the internet and controlled remotely by the botnet’s owner. But how are these made? Why are they almost always associated with nefarious activities? And are there any botnets out there doing good?

There are a few ways for someone to start amassing a botnet. The most common involves an individual purchasing or building a malicious program that will infect a targeted computer or network of computers. Usually this is in the form of a Trojan Horse, but it can be done with drive by downloading or exploitation of browser vulnerabilities. The program then logs into the victim’s command and control server, and as simple as that the infected computer is now at the mercy of the botnet’s owner.

Botnets can be rather small, to impressively massive in scale. However, the only individuals who may have any guess as to how large these networks are would be the botnet operators themselves. This is because the infected computers rarely experience any disruptions in normal service except when they are being used for various tasks that the owner has commanded them to take part in. Also most attempts to track botnets by the number of IP addresses within them may lead to inaccurate estimates, since the owner may be tumbling through numerous IPs.

Botnets usually get a bad reputation because of the overwhelming number of malicious activities that they have been used in. Especially with media outlets reporting sensationalist stories of attacks using botnets -which seem to always blame the Internet more than the actual human attackers-.

Related Post

That being said, botnets usually are used for things like distributed denial of service (DDoS) attacks. These DDoS attacks have played large roles in attacking financial institutions and other organizations in the past. It makes sense, as a botnet can provide an incredible amount of traffic/power to an attack like that with the keystrokes of a single actor. But botnets are also used in spyware campaigns, click fraud, and dubious bitcoin mining.

However, I feel like not all botnets are used for such activities. The difference between botnets used in illegal activities and botnets which are helpful for benevolent and benign applications, to me, appears to be what we call them and how we acquire them. Cloud computing applications like Amazon Web Services seems to share a large amount of characteristics of botnets as far as their usability. The difference, of course, is that we call that AWS and all of the computing power is legally rented out to users.

So I think, yes, some types of botnets can be used for good -provided that the companies and individuals renting out AWS are on the level-. But with the reputation that botnets have, I can wholly understand why AWS and other similar services would call themselves “Cloud Computing” as opposed to “Botnet.”

If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

Dariusz

Dariusz has been closely following the world of cryptocurrencies since 2014. He has been somewhat of a crypto-evangelist, trying to educate more people on the exciting realm of cryptocurrency.

Share
Published by
Dariusz

Recent Posts

The Calculated Collapse of $TG: How a “Utility” Token Was Engineered for a Rug Pull

In the unpredictable world of cryptocurrency, new tokens launch daily, each one a shining beacon…

1 day ago

Staked Ethereum Hits Record High as Whale Accumulation Signals Bullish Long-Term Sentiment

Once more, Ethereum is commanding the spotlight as fresh figures indicate that the amount of…

1 day ago

Arbitrum Sees Surge in Protocol Revenue and EIP-7702 Adoption Following ArbOS 40 Upgrade

The ecosystem on Arbitrum keeps flaunting its robust foundations, with a steady incline in the…

1 day ago

Ethereum Whale Accumulation Surges as Long-Term Confidence Outweighs Short-Term Volatility

Once again, major market players are focusing on Ethereum. The whale activity surrounding the second-largest…

4 days ago

Week in AI: Fartcoin Steals the Spotlight Amid Market Turmoil

It has been a tumultuous week for the artificial intelligence sector in crypto. Sharp valuation…

5 days ago

BSC Foundation Resumes Strategic Accumulation: VIXBT, CAKE, LISTA, and MOOLAH Under Spotlight

Following a brief stint of dormancy, the BSC Foundation is back in action, reestablishing its strategic…

7 days ago