The image of a DDoS attack on a website with lots of requests sent over extremely short periods of time can overwhelm the server.
For example, a bank's online trading site was attacked in an hour. In that hour, the bank's real customers could not trade, causing them to switch to the website of an intermediary or another bank, so the attacked bank lost revenue. Or as delicate as that, if you are attacked, you cannot go to read the article, too many times, you will be bored and not play anymore.
Botnets can also be used to distribute viruses, steal passwords or to distribute spam. Generally, botnets are extremely cheap and effective ways for cyber criminals to take advantage of the power of many computers to do bad things.
To tell a little story, McAfee once said they collaborated with the US Justice Department to destroy a botnet called Gameover Zeus. This botnet will steal personal information, such as bank account username and password. It is also used to distribute Cryptolocker, a specialized ransomware that encrypts user's files for ransom. You can learn more about ransomeware here. Since its inception, Gameover Zeus and Cryptolocker have caused more than $ 100 million in damage and $ 27 million in order. The creator of this botnet, Evgeniy Mikhailovich Bogachev, is being wanted by the FBI.
Previous botnets only appeared on computers, but now extended to both mobile devices and most recently an Internet-connected surveillance camera in Vietnam was also struck. In fact, these cameras are also a miniature computer. But the danger is that people do not know in this camera installed bot, and it is only used to attack many other websites but also makes the transmission of the user is markedly slow. See more here: Details of many security cameras in Vietnam are being taken advantage of for DDoS attacks.
Most recent botnets have used the P2P peer model completely (so is Gameover Zeus). The command and implementation are completely embedded in the botnet instead of having to use the server, so there is no single weakness. In the traditional way, the hacker server is knocked down, the attack will stop, while in P2P, one PC will be destroyed, the remaining PCs will continue their work.
Listen, the botnet doesn't seem to be harmful to your computer, because it is used to attack people's websites? But no, botnets can also be integrated with other functions to disrupt files in our PCs, such as the ransomeware above or the credit card stealing virus. Some botnets are capable of downloading other malware themselves, so once the bot has entered, it will open the door to other malicious software. In general, the risk of botnets with us is still very high, not inferior to other types of malicious software.
Anti-botnet is like anti-virus, you can apply the same measures to protect your device.
1. Be careful with USB or strange devices plugged into your computer: there may already be a bot available on the USB device from another computer, when it is attached to your PC, it will infect and sneak in your PC. unaware. The best way is to be careful with USB devices like this and use more anti-virus software to protect against bot attacks.
2. Speaking of antivirus software, you should use Win to choose a solution that is safe for your computer. Currently Windows 10 and the built-in alert mechanisms in Windows are smart enough to prevent many threats but are still only normal, with complex bots or malware, Windows cannot detect. So you might consider using an antivirus software if your environment is often at risk (for example, a copier desktop computer). Currently copyright of antivirus software is also quite cheap, about 150,000 to 200,000 VND a year.
3. Be careful when surfing the web. This is a great way for hackers to use it because he can easily trick you into downloading a certain image file or document file but actually has malware inside. As soon as you click on the file, the bot has started running and is able to infect other PCs on the same network. When you see messages like "Your computer is infected with a virus" or "You are lucky to be chosen to .", don't be fooled by it because you may accidentally download the bot to your computer without knowing it.
4. Talking about mobile devices, you should only install the app that is confirmed to be safe and install only from Play Store or App Store, do not use third-party app stores. Currently there are many malware appearing on both Android and iOS (jailbroken) devices to turn your smartphone into a network bot.
5. Security cameras are a new danger when talking about botnets. Cameras with unclear origins, mostly non-branded Chinese, have the ability to be embedded with botnets without you knowing it. Choose a camera from reputable firms and regularly monitor the line to see if something is wrong.