Oct 31


Botnet Tricks and Security Treats

By Georganne Benesch

“Cybercriminals are spreading faster than the hordes of the undead in Zombietown, USA”, writes security blogger  Tom Fecarotta.

And so maybe it’s not a coincidence that Halloween falls on the last day of National Cybersecurity Awareness Month. Regardless, we hope that the ghouls and ghosts knocking on your door are only after chocolate bars and gummy bears.

For cybercriminals, ‘treats’ come in many flavors: stolen identities, pilfered financial data, ransoms and IP theft. And these hackers leverage all sorts of ‘tricks’ to wreak havoc for individuals and businesses alike. Given that some cyberattacks resemble a Zombie Apocalypse and require a heroic response—Halloween seems like a good time to mention one of the spookiest of cyber threats.

Zombie armies are taking over the Internet in the form of massive botnets looking for vulnerable devices across the Internet, with the objective of infecting as many as possible. A botnet hoard of compromised computers, all corrupted with the same malware, gives a hacker remote control of these computers, hijacking them without their owners’ knowledge. A bot ‘herder’ can send instructions to this network of computers for multiple purposes: access credit card numbers and banking credentials, launch DDoS attacks, deliver spam and more.

Botnets may be the most damaging security threats and the most difficult to eradicate. In 2015 the FBI testified in a U.S. Senate hearing that there were an estimated $110 billion in losses to victims globally. They reported that 500 million computers fall prey to botnet attackers annually, or approximately 18 victims infected per second. And it only continues to get worse, especially as IoT devices proliferate.


Be a Superhero

In pop culture, it’s tough to destroy a Zombie army, and in the real-world efforts to bring down botnets are normally undertaken by law enforcement. So, what can your organization’s own Justice League of IT and security pros do to safeguard data?

Although it may not be possible to prevent or even block a botnet driven attack, taking a comprehensive approach to data security, including implementing workflows and solutions dedicated to discovery, control and remediation, can go a long way towards minimizing the damage. Watch for future posts where we’ll discuss the importance of visibility, detection, identification and real-time monitoring, especially as it relates to your IoT applications and devices.

In the meantime, enjoy this little treat where the CDC gives their advice on how to be prepared for a Zombie Apocalypse!


Get the Gartner Market Trends IoT Security Report


Related Posts

Nov 30


Medical Device Security Needs an Infusion. Stat.

Medical devices have a profoundly positive impact on the quality of healthcare. Whether stationary, bedside or portable, they improve patient experience and outcomes, accelerate recovery times and...

Nov 22


Cyber Theft: Another Holiday Tradition?

Brace yourselves. Black Friday and Cyber Monday are just around the corner, and they’re going to be huge. Consumer spending is forecasted to grow by a remarkable 47% over the same period last year....

Oct 27


Cybercrime and the New Normal

With an increase in high-profile cyberattacks and data breaches, it’s no surprise that cybersecurity is top of mind for the C-suite. According to the digital security firm Gemalto, there were 918...

Subscribe to Blog Updates