A botnet is a collection of computers that are under the control of a person or group, usually facilitated by malware. These computers are often used to take part in DDoS attacks and spamming.
Questions tagged [botnet]
162 questions
                    
                    85
                    
            votes
                
                10 answers
            
        How and why is my site being abused?
I own a popular website that allows people to enter a phone number and get information back about that phone number, such as the name of the phone carrier. It's a free service, but it costs us money for each query so we show ads on the site to help…
        
        Marc
        
- 699
 - 1
 - 4
 - 4
 
                    82
                    
            votes
                
                5 answers
            
        Email Account under attack (really) - anything I can do?
Over the last week, there is a constant barrage of authentication failures to my email account from a variety of ip addresses - usually in blocks of exactly 575 attempts.
My password is as strong as a password can be so the chance of brute force…
        
        clemdia
        
- 831
 - 1
 - 5
 - 7
 
                    48
                    
            votes
                
                5 answers
            
        I managed to capture a botnet control host, what do I do with it?
A few days ago one of my webhosting customers had their FTP login compromised, and the attacker modified his index.php file to include some extra code, and roughly twelve thousand other bots have been trying to access it via a POST operation…
        
        Shadur
        
- 2,495
 - 21
 - 19
 
                    30
                    
            votes
                
                10 answers
            
        Received email from ISP saying one of my devices has malware
My dad received a suspicious email from our ISP (mtnl.net.in).
The email was from noreply@mtnl.net.in and it had our user ID (I masked it as xxxxxxxx@a) in the email so it must have come from the ISP itself.
Email details below:
Subject:
"Intimation…
        
        Nigel Fds
        
- 453
 - 4
 - 11
 
                    27
                    
            votes
                
                2 answers
            
        How is Google abused for DDoS attacks?
While analysing a DDoS attack on my site using CloudFlare console, I've noticed that many attack requests come from AS139190 GOOGLE-AS-AP Google Asia Pacific Pte. Ltd. with Empty user agent.
I'm wondering how Google is exploited to attack my site?
        
        blnks
        
- 383
 - 2
 - 7
 
                    25
                    
            votes
                
                5 answers
            
        How is IRC so secure/untraceable that hackers and pirates use it to communicate?
What is so special about IRC that hackers use it to do online meetings, ignoring every other option, like messengers or social media?
It seems to be very secure that it gets used to send commands to victim's computers instead of just sending them…
        
        Ulkoma
        
- 8,793
 - 16
 - 65
 - 95
 
                    23
                    
            votes
                
                10 answers
            
        How do I know if my computer is being used for a botnet-based DDoS attack?
A botnet is a collection of compromised computers, each of which is
  known as a 'bot', connected to the Internet. When a computer is
  compromised by an attacker, there is often code within the malware
  that commands it to become part of a…
        
        Diogo
        
- 657
 - 2
 - 5
 - 10
 
                    21
                    
            votes
                
                4 answers
            
        What are spambots doing with unintelligible login attempts?
After constantly being under attack in phpBB, I created a new forum by hand, which successfully prevents spam bots from registering, and I get a report for every failed login attempt, telling me the info they tried, their IP address, whether they're…
        
        Alex
        
- 311
 - 2
 - 4
 
                    19
                    
            votes
                
                2 answers
            
        How secure is Stack Exchange's reputation?
I recently read an article about researchers being able to penetrate the Facebook network and making lots of friends with about 100 "Social" bots. What would prevent somebody to do the same on Stack Exchange sites, so as to increase his reputation?…
        
        user1202136
        
- 595
 - 4
 - 8
 
                    15
                    
            votes
                
                1 answer
            
        Should a server be considered compromised simply because a port was open?
Earlier today I received a notification of a security incident at Mandrill. At first I was concerned, but then after I dove into the details I became confused as to why they considered this noteworthy at all.
To summarize, it appears that Mandrill…
        
        Michael Hampton
        
- 3,877
 - 1
 - 22
 - 32
 
                    15
                    
            votes
                
                6 answers
            
        Why do botnets use IRC but not a web service for communication?
IRC seems still the most prominent way for communication within botnets.
Why do attackers choose IRC?
In my (very naive) opinion, to set up a web service is far more easier.
        user1221
                    15
                    
            votes
                
                3 answers
            
        Are HTTP brute-force password-guessing attacks common nowadays?
Are brute-force attacks against online accounts (gmail, facebook, instagram)  something that really happens? I don't mean something like cracking password hashes or DDoS, but real brute-force attacks (e.g., password guessing) using a botnet or…
        
        Martin
        
- 535
 - 3
 - 11
 
                    14
                    
            votes
                
                4 answers
            
        Looking for botnet IP address feeds to protect against DDoS
I would like to get a live feed of botnet IP addresses delivered from a service and block them under certain conditions. Preferably community based/open source but open to looking at worthy commercial ones too. So far I have come across dshield…
        
        shavian
        
- 149
 - 1
 - 1
 - 4
 
                    12
                    
            votes
                
                1 answer
            
        Can/do botnets brute force "high value" users of services like Gmail?
On an intranet a login is generally disabled after a very small number of failed logins.
But a public email service like Gmail can't do the same, otherwise pranksters would just be continuously locking people out.
Unlike brute forcing a password…
        
        George Hawkins
        
- 1,135
 - 8
 - 11
 
                    11
                    
            votes
                
                4 answers
            
        Can I protect my router from a Mirai Worm and how do I know if I'm vulnerable?
Today this article was published by the BBC: Talk Talk and Post Office routers hit by cyber-attack. It states:
It involves the use of a modified form of the Mirai worm - a type of
  malware that is spread via hijacked computers, which causes damage…
        
        User1
        
- 3,041
 - 5
 - 23
 - 30