From the botnet to Dyn, what is the botnet?

Recently a large-scale botnet happened in the US, specifically targeting Dyn, a domain name management company, which prevented many users from accessing Dyn's websites. . These include many well-known sites such as Twitter, Netflix, Reddit, CNN, Paypal, Pinterest, Fox News, Spotify, Guardian, New York Times and Wall Street Journal. So what is a botnet? The concept of botnets seems quite vague while there are quite a number of attacks every year on a medium and large scale.

What is a botnet?

Botnet can be understood as a computer network containing many computers infected with malware or installed software created by hackers.

A botnet can have from several hundred thousand to several million, even several tens of millions of computers. In addition to computers, botnet is currently deployed on mobile devices, IoT devices, cameras, components in smart houses connected to the Internet. Botnets often serve a bad purpose such as attacking distributed denial of service (DDos) into a system that affects users who really need services, spamming (Spamming Mail) attacks, and A lot of other purposes. Of course, no matter what the purpose, it will only cost money and reputation for the attacked party.

If your computer is a component of a botnet, it means that it has been infected with one of several types of malware (such as viruses, worms …). Computer users are at risk of becoming victims of botnets similar to the way they are infected with malware. For example, when you use 1 software, it is no longer updated security patches, using high-risk plugins, when downloading pirated software (I often use IDM illegally).

Hackers create botnets and use it?

To create a botnet, the first thing is that hackers need to infect the desired components, tools, worms, viruses into users' computers (hackers do not know these users). After the infection is complete, the first thing is that the bot will connect to the server and the hacker control center will use the password and then just wait for the command. When the command is issued by the hacker, these bots immediately take control to control the computer and attack the designated target.

Each bot in the botnet system will send a request to a certain server (the target needs to attack) to pretend to be a user, they also request a packet of large capacity to occupy the bandwidth. Of course, with requests from several million to several hundred million and constantly hitting the server, it is difficult to support.

Simulation of DDos - jusfunny - botnet attack

Simulation of DDos attack

So how do hackers spread bots when they don't know the computer he wants to install? It's simple, just through pirated software (crack, cheat), through anonymous emails with lines The link containing the virus, which only needs to be clicked, has been automatically downloaded, through a lot of black websites, but you have to ask for a full link without cover (ahihi), the shortened link pages have a lot of potential risks …. . And there are many more ways that can take a long time to tell, and it is hard to detect. In Vietnam, there are also many people who are part of the botnet system without knowing it, because Vietnam is one of the many countries that use the most pirated software in the world, considered the world's leading pig film. Ahihi.

How to prevent botnet?

In fact, if your computer is put into a botnet and used to attack other people, you don't suffer much. But not only that purpose, but also to use DDos, hackers can steal information (usually username and bank password), important documents, self-filmed xxx movies, pornographic photos taken by themselves. you put it on the phone. Or maybe it encrypts important files on your computer and demands new decryption.

In addition, a high risk is that once the bot has crashed into your computer, it will open the door for malware and other viruses to enter by opening the port, auto downloading and installing. It is best to prevent the disease rather than cure it, it is still as dangerous as any other malicious code or virus. Every year the world consumes billions of dollars of damage but still has not solved this problem, cybercriminals are increasingly smart and sophisticated to deceive users who have trapped also increased rapidly. When I was writing this article, I also searched for laptops to see if there were any movies, but it was very hard for a beautiful day.

Join the Machine Learning event - Technology of the Future!
Join the Machine Learning event – Technology of the Future!

So what to do now? For not for restrict hackers who have the opportunity to invade your computer should pay attention to the following tasks:

  • Be careful with the source you download the software. Software should only be installed in reliable sources, and it is best to use copyrighted software to avoid unreliable patches and crack.
  • Carefully scan the virus before allowing your computer to read the USB content, knowing a bot from infected machines silently intruded and lying there waiting. Just waiting for you to plug in is starting to spread, stealthily installing without you knowing.
  • Use powerful antivirus software. Of course, this anti-virus software cannot guarantee 100% protection, for old hackers it is almost impossible to cure. But anyway it is more than not, and now the price of antivirus software is quite soft, within reach.
  • For mobile, you should only download the app from trusted distributors like Google Play Store (Android), App Store (IOS). Although the above applications are moderated to be quite safe, but not impossible, there is a dirty upload application that is only intended to turn your device into a bot in some botnet system.
  • Cameras and peripherals with an internet connection are also a major threat, so those of unknown origin or relatively cheap prices should be wary. I fear the most is Mr. Tung Cua, a copy expert (fake copy) and not forgetting the promotion for the users who saved the bot. Should spend a little more money to buy reputable firms a bit, will reduce the risk of insecurity in network security.

This article is just a basic description of your botnet knowledge and how to attack botnets. There is a lot of knowledge that I don't know about, and I can't dare to affirm that all the knowledge I said here is completely accurate. Hope everyone reads and comments if possible.

ITZone via justfunny

Share the news now