Home Page Navigation Contents Contact Sitemap Search


These are net­works usu­ally con­sisting of sev­eral thou­sand devices linked with each other after being infected with mal­ware. Illegal botnet oper­a­tors usu­ally install bots without a device owner’s knowl­edge on the unit to abuse its resources for their pur­poses, for instance dis­trib­uted DDoS attacks, sending out spam mails or mining crypto cur­ren­cies. Most bots can be mon­i­tored via a com­mu­ni­ca­tion channel by a bot net oper­ator and can receive commands.