Rogue developers assemble networked software agents, or bots, out of code downloaded from covert Web sites.
2) Distribute.
Once a bot is released onto the Internet, it seeks out vulnerable systems where it can proliferate.
3) Market.
Bot-herders approach customers through spam and chat channels, offering botnet bandwidth to carry out scams and attacks.
4) Activate.
A botnet remains dormant until it receives instructions issued through a command and control server. Then it strikes.
5) Profit.
Botnets install adware to collect per-install revenue, sell stolen passwords, and attack enterprises to extort funds.
No comments:
Post a Comment